START	lib/libssl/interop	2024-05-25T18:31:30Z

===> libressl
==== run-self-client-server ====
cc -O2 -pipe  -DLIBRESSL_HAS_TLS1_3 -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow  -MD -MP   -c /usr/src/regress/lib/libssl/interop/libressl/../client.c
cc -O2 -pipe  -DLIBRESSL_HAS_TLS1_3 -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow  -MD -MP   -c /usr/src/regress/lib/libssl/interop/libressl/../util.c
cc    -o client client.o util.o -lssl -lcrypto
cc -O2 -pipe  -DLIBRESSL_HAS_TLS1_3 -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow  -MD -MP   -c /usr/src/regress/lib/libssl/interop/libressl/../server.c
cc    -o server server.o util.o -lssl -lcrypto
openssl req -batch -new  -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/  -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt
Generating a 2048 bit RSA private key
.................
......................................................
writing new private key to '127.0.0.1.key'
-----
# check that tls client and server work together
LD_LIBRARY_PATH=  ./server >server-self.out  127.0.0.1 0
LD_LIBRARY_PATH=  ./client >client-self.out  `sed -n 's/listen sock: //p' server-self.out`
# wait for server to terminate
sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null
*** Error 123 in target 'run-self-client-server' (ignored)
# check that the client run successfully to the end
grep -q '^success$' client-self.out
# client must have read server greeting
grep -q '^<<< greeting$' client-self.out
# check that the server child run successfully to the end
grep -q '^success$' server-self.out
# server must have read client hello
grep -q '^<<< hello$' server-self.out

==== run-ldd-client ====
# programs must be linked with correct libraries
LD_LIBRARY_PATH= ldd client >ldd-client.out
# check that client is linked with LibreSSL
grep -q /usr/lib/libcrypto.so ldd-client.out
grep -q /usr/lib/libssl.so ldd-client.out
# check that client is not linked with OpenSSL
! grep /usr/local/lib/ ldd-client.out

==== run-version-client ====
# check that tls client and server work together
LD_LIBRARY_PATH=  ./server >server-self.out  127.0.0.1 0
LD_LIBRARY_PATH=  ./client >client-self.out  `sed -n 's/listen sock: //p' server-self.out`
# wait for server to terminate
sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null
*** Error 123 in target 'run-self-client-server' (ignored)
# check that the client run successfully to the end
grep -q '^success$' client-self.out
# client must have read server greeting
grep -q '^<<< greeting$' client-self.out
# check that the server child run successfully to the end
grep -q '^success$' server-self.out
# server must have read client hello
grep -q '^<<< hello$' server-self.out
# check that runtime version is LibreSSL
grep 'SSLEAY_VERSION: LibreSSL' client-self.out
SSLeay_version SSLEAY_VERSION: LibreSSL 3.9.0

==== run-protocol-client ====
# check that tls client and server work together
LD_LIBRARY_PATH=  ./server >server-self.out  127.0.0.1 0
LD_LIBRARY_PATH=  ./client >client-self.out  `sed -n 's/listen sock: //p' server-self.out`
# wait for server to terminate
sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null
*** Error 123 in target 'run-self-client-server' (ignored)
# check that the client run successfully to the end
grep -q '^success$' client-self.out
# client must have read server greeting
grep -q '^<<< greeting$' client-self.out
# check that the server child run successfully to the end
grep -q '^success$' server-self.out
# server must have read client hello
grep -q '^<<< hello$' server-self.out
# check that LibreSSL protocol version is TLS 1.3
grep 'Protocol *: TLSv1.3' client-self.out
    Protocol  : TLSv1.3

==== run-ldd-server ====
# programs must be linked with correct libraries
LD_LIBRARY_PATH= ldd server >ldd-server.out
# check that server is linked with LibreSSL
grep -q /usr/lib/libcrypto.so ldd-server.out
grep -q /usr/lib/libssl.so ldd-server.out
# check that server is not linked with OpenSSL
! grep /usr/local/lib/ ldd-server.out

==== run-version-server ====
# check that tls client and server work together
LD_LIBRARY_PATH=  ./server >server-self.out  127.0.0.1 0
LD_LIBRARY_PATH=  ./client >client-self.out  `sed -n 's/listen sock: //p' server-self.out`
# wait for server to terminate
sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null
*** Error 123 in target 'run-self-client-server' (ignored)
# check that the client run successfully to the end
grep -q '^success$' client-self.out
# client must have read server greeting
grep -q '^<<< greeting$' client-self.out
# check that the server child run successfully to the end
grep -q '^success$' server-self.out
# server must have read client hello
grep -q '^<<< hello$' server-self.out
# check that runtime version is LibreSSL
grep 'SSLEAY_VERSION: LibreSSL' server-self.out
SSLeay_version SSLEAY_VERSION: LibreSSL 3.9.0

==== run-protocol-server ====
# check that tls client and server work together
LD_LIBRARY_PATH=  ./server >server-self.out  127.0.0.1 0
LD_LIBRARY_PATH=  ./client >client-self.out  `sed -n 's/listen sock: //p' server-self.out`
# wait for server to terminate
sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null
*** Error 123 in target 'run-self-client-server' (ignored)
# check that the client run successfully to the end
grep -q '^success$' client-self.out
# client must have read server greeting
grep -q '^<<< greeting$' client-self.out
# check that the server child run successfully to the end
grep -q '^success$' server-self.out
# server must have read client hello
grep -q '^<<< hello$' server-self.out
# check that LibreSSL protocol version is TLS 1.3
grep 'Protocol *: TLSv1.3' server-self.out
    Protocol  : TLSv1.3

===> openssl11
==== run-self-client-server ====
cc -O2 -pipe  -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow  -MD -MP -I /usr/local/include/eopenssl11 -c /usr/src/regress/lib/libssl/interop/openssl11/../client.c
cc -O2 -pipe  -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow  -MD -MP -I /usr/local/include/eopenssl11 -c /usr/src/regress/lib/libssl/interop/openssl11/../util.c
cc -L /usr/local/lib/eopenssl11  -o client client.o util.o -lssl -lcrypto
/usr/local/lib/eopenssl11/libcrypto.so.11.6: warning: strcat() is almost always misused, please use strlcat()
/usr/local/lib/eopenssl11/libssl.so.11.6: warning: strcpy() is almost always misused, please use strlcpy()
/usr/local/lib/eopenssl11/libssl.so.11.6: warning: sprintf() is often misused, please use snprintf()
cc -O2 -pipe  -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow  -MD -MP -I /usr/local/include/eopenssl11 -c /usr/src/regress/lib/libssl/interop/openssl11/../server.c
cc -L /usr/local/lib/eopenssl11  -o server server.o util.o -lssl -lcrypto
/usr/local/lib/eopenssl11/libcrypto.so.11.6: warning: strcat() is almost always misused, please use strlcat()
/usr/local/lib/eopenssl11/libssl.so.11.6: warning: strcpy() is almost always misused, please use strlcpy()
/usr/local/lib/eopenssl11/libssl.so.11.6: warning: sprintf() is often misused, please use snprintf()
openssl req -batch -new  -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/  -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt
Generating a 2048 bit RSA private key
.........................................
.............................
writing new private key to '127.0.0.1.key'
-----
# check that tls client and server work together
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ./server >server-self.out  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ./client >client-self.out  `sed -n 's/listen sock: //p' server-self.out`
# wait for server to terminate
sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null
*** Error 123 in target 'run-self-client-server' (ignored)
# check that the client run successfully to the end
grep -q '^success$' client-self.out
# client must have read server greeting
grep -q '^<<< greeting$' client-self.out
# check that the server child run successfully to the end
grep -q '^success$' server-self.out
# server must have read client hello
grep -q '^<<< hello$' server-self.out

==== run-ldd-client ====
# programs must be linked with correct libraries
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ldd client >ldd-client.out
# check that client is linked with OpenSSL 1.1
grep -q /usr/local/lib/eopenssl11/libcrypto.so ldd-client.out
grep -q /usr/local/lib/eopenssl11/libssl.so ldd-client.out
# check that client is not linked with LibreSSL
! grep -v libc.so ldd-client.out | grep /usr/lib/

==== run-version-client ====
# check that tls client and server work together
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ./server >server-self.out  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ./client >client-self.out  `sed -n 's/listen sock: //p' server-self.out`
# wait for server to terminate
sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null
*** Error 123 in target 'run-self-client-server' (ignored)
# check that the client run successfully to the end
grep -q '^success$' client-self.out
# client must have read server greeting
grep -q '^<<< greeting$' client-self.out
# check that the server child run successfully to the end
grep -q '^success$' server-self.out
# server must have read client hello
grep -q '^<<< hello$' server-self.out
# check that runtime version is OpenSSL 1.1
grep 'SSLEAY_VERSION: OpenSSL 1.1' client-self.out
SSLeay_version SSLEAY_VERSION: OpenSSL 1.1.1w  11 Sep 2023

==== run-protocol-client ====
# check that tls client and server work together
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ./server >server-self.out  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ./client >client-self.out  `sed -n 's/listen sock: //p' server-self.out`
# wait for server to terminate
sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null
*** Error 123 in target 'run-self-client-server' (ignored)
# check that the client run successfully to the end
grep -q '^success$' client-self.out
# client must have read server greeting
grep -q '^<<< greeting$' client-self.out
# check that the server child run successfully to the end
grep -q '^success$' server-self.out
# server must have read client hello
grep -q '^<<< hello$' server-self.out
# check that OpenSSL 1.1 protocol version is TLS 1.3
grep 'Protocol *: TLSv1.3' client-self.out
    Protocol  : TLSv1.3

==== run-ldd-server ====
# programs must be linked with correct libraries
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ldd server >ldd-server.out
# check that server is linked with OpenSSL 1.1
grep -q /usr/local/lib/eopenssl11/libcrypto.so ldd-server.out
grep -q /usr/local/lib/eopenssl11/libssl.so ldd-server.out
# check that server is not linked with LibreSSL
! grep -v libc.so ldd-server.out | grep /usr/lib/

==== run-version-server ====
# check that tls client and server work together
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ./server >server-self.out  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ./client >client-self.out  `sed -n 's/listen sock: //p' server-self.out`
# wait for server to terminate
sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null
*** Error 123 in target 'run-self-client-server' (ignored)
# check that the client run successfully to the end
grep -q '^success$' client-self.out
# client must have read server greeting
grep -q '^<<< greeting$' client-self.out
# check that the server child run successfully to the end
grep -q '^success$' server-self.out
# server must have read client hello
grep -q '^<<< hello$' server-self.out
# check that runtime version is OpenSSL 1.1
grep 'SSLEAY_VERSION: OpenSSL 1.1' server-self.out
SSLeay_version SSLEAY_VERSION: OpenSSL 1.1.1w  11 Sep 2023

==== run-protocol-server ====
# check that tls client and server work together
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ./server >server-self.out  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ./client >client-self.out  `sed -n 's/listen sock: //p' server-self.out`
# wait for server to terminate
sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null
*** Error 123 in target 'run-self-client-server' (ignored)
# check that the client run successfully to the end
grep -q '^success$' client-self.out
# client must have read server greeting
grep -q '^<<< greeting$' client-self.out
# check that the server child run successfully to the end
grep -q '^success$' server-self.out
# server must have read client hello
grep -q '^<<< hello$' server-self.out
# check that OpenSSL 1.1 protocol version is TLS 1.3
grep 'Protocol *: TLSv1.3' server-self.out
    Protocol  : TLSv1.3

===> openssl30
Run "pkg_add openssl--%3.0" to run tests against OpenSSL 3.0
SKIPPED
===> openssl31
==== run-self-client-server ====
cc -O2 -pipe  -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow  -MD -MP -I /usr/local/include/eopenssl31 -c /usr/src/regress/lib/libssl/interop/openssl31/../client.c
cc -O2 -pipe  -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow  -MD -MP -I /usr/local/include/eopenssl31 -c /usr/src/regress/lib/libssl/interop/openssl31/../util.c
cc -L /usr/local/lib/eopenssl31  -o client client.o util.o -lssl -lcrypto
/usr/local/lib/eopenssl31/libcrypto.so.15.1: warning: strcat() is almost always misused, please use strlcat()
/usr/local/lib/eopenssl31/libssl.so.15.1: warning: strcpy() is almost always misused, please use strlcpy()
/usr/local/lib/eopenssl31/libssl.so.15.1: warning: sprintf() is often misused, please use snprintf()
cc -O2 -pipe  -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow  -MD -MP -I /usr/local/include/eopenssl31 -c /usr/src/regress/lib/libssl/interop/openssl31/../server.c
/usr/src/regress/lib/libssl/interop/openssl31/../server.c:177:8: warning: 'PEM_read_DHparams' is deprecated [-Wdeprecated-declarations]
                dh = PEM_read_DHparams(file, NULL, NULL, NULL);
                     ^
/usr/local/include/eopenssl31/openssl/pem.h:472:21: note: 'PEM_read_DHparams' has been explicitly marked deprecated here
DECLARE_PEM_rw_attr(OSSL_DEPRECATEDIN_3_0, DHparams, DH)
                    ^
/usr/local/include/eopenssl31/openssl/macros.h:193:49: note: expanded from macro 'OSSL_DEPRECATEDIN_3_0'
#   define OSSL_DEPRECATEDIN_3_0                OSSL_DEPRECATED(3.0)
                                                ^
/usr/local/include/eopenssl31/openssl/macros.h:62:52: note: expanded from macro 'OSSL_DEPRECATED'
#     define OSSL_DEPRECATED(since) __attribute__((deprecated))
                                                   ^
1 warning generated.
cc -L /usr/local/lib/eopenssl31  -o server server.o util.o -lssl -lcrypto
/usr/local/lib/eopenssl31/libcrypto.so.15.1: warning: strcat() is almost always misused, please use strlcat()
/usr/local/lib/eopenssl31/libssl.so.15.1: warning: strcpy() is almost always misused, please use strlcpy()
/usr/local/lib/eopenssl31/libssl.so.15.1: warning: sprintf() is often misused, please use snprintf()
openssl req -batch -new  -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/  -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt
Generating a 2048 bit RSA private key
...
.......................................................................................
writing new private key to '127.0.0.1.key'
-----
# check that tls client and server work together
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ./server >server-self.out  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ./client >client-self.out  `sed -n 's/listen sock: //p' server-self.out`
# wait for server to terminate
sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null
*** Error 123 in target 'run-self-client-server' (ignored)
# check that the client run successfully to the end
grep -q '^success$' client-self.out
# client must have read server greeting
grep -q '^<<< greeting$' client-self.out
# check that the server child run successfully to the end
grep -q '^success$' server-self.out
# server must have read client hello
grep -q '^<<< hello$' server-self.out

==== run-ldd-client ====
# programs must be linked with correct libraries
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31 ldd client >ldd-client.out
# check that client is linked with OpenSSL 3.1
grep -q /usr/local/lib/eopenssl31/libcrypto.so ldd-client.out
grep -q /usr/local/lib/eopenssl31/libssl.so ldd-client.out
# check that client is not linked with LibreSSL
! grep -v libc.so ldd-client.out | grep /usr/lib/

==== run-version-client ====
# check that tls client and server work together
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ./server >server-self.out  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ./client >client-self.out  `sed -n 's/listen sock: //p' server-self.out`
# wait for server to terminate
sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null
*** Error 123 in target 'run-self-client-server' (ignored)
# check that the client run successfully to the end
grep -q '^success$' client-self.out
# client must have read server greeting
grep -q '^<<< greeting$' client-self.out
# check that the server child run successfully to the end
grep -q '^success$' server-self.out
# server must have read client hello
grep -q '^<<< hello$' server-self.out
# check that runtime version is OpenSSL 3.1
grep 'SSLEAY_VERSION: OpenSSL 3.1' client-self.out
SSLeay_version SSLEAY_VERSION: OpenSSL 3.1.5 30 Jan 2024

==== run-protocol-client ====
# check that tls client and server work together
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ./server >server-self.out  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ./client >client-self.out  `sed -n 's/listen sock: //p' server-self.out`
# wait for server to terminate
sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null
*** Error 123 in target 'run-self-client-server' (ignored)
# check that the client run successfully to the end
grep -q '^success$' client-self.out
# client must have read server greeting
grep -q '^<<< greeting$' client-self.out
# check that the server child run successfully to the end
grep -q '^success$' server-self.out
# server must have read client hello
grep -q '^<<< hello$' server-self.out
# check that OpenSSL 3.1 protocol version is TLS 1.3
grep 'Protocol *: TLSv1.3' client-self.out
    Protocol  : TLSv1.3

==== run-ldd-server ====
# programs must be linked with correct libraries
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31 ldd server >ldd-server.out
# check that server is linked with OpenSSL 3.1
grep -q /usr/local/lib/eopenssl31/libcrypto.so ldd-server.out
grep -q /usr/local/lib/eopenssl31/libssl.so ldd-server.out
# check that server is not linked with LibreSSL
! grep -v libc.so ldd-server.out | grep /usr/lib/

==== run-version-server ====
# check that tls client and server work together
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ./server >server-self.out  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ./client >client-self.out  `sed -n 's/listen sock: //p' server-self.out`
# wait for server to terminate
sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null
*** Error 123 in target 'run-self-client-server' (ignored)
# check that the client run successfully to the end
grep -q '^success$' client-self.out
# client must have read server greeting
grep -q '^<<< greeting$' client-self.out
# check that the server child run successfully to the end
grep -q '^success$' server-self.out
# server must have read client hello
grep -q '^<<< hello$' server-self.out
# check that runtime version is OpenSSL 3.1
grep 'SSLEAY_VERSION: OpenSSL 3.1' server-self.out
SSLeay_version SSLEAY_VERSION: OpenSSL 3.1.5 30 Jan 2024

==== run-protocol-server ====
# check that tls client and server work together
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ./server >server-self.out  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ./client >client-self.out  `sed -n 's/listen sock: //p' server-self.out`
# wait for server to terminate
sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null
*** Error 123 in target 'run-self-client-server' (ignored)
# check that the client run successfully to the end
grep -q '^success$' client-self.out
# client must have read server greeting
grep -q '^<<< greeting$' client-self.out
# check that the server child run successfully to the end
grep -q '^success$' server-self.out
# server must have read client hello
grep -q '^<<< hello$' server-self.out
# check that OpenSSL 3.1 protocol version is TLS 1.3
grep 'Protocol *: TLSv1.3' server-self.out
    Protocol  : TLSv1.3

===> netcat
==== run-netcat-client-libressl-server-nc ====
openssl req -batch -new  -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/  -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt
Generating a 2048 bit RSA private key
................................................
.........................
writing new private key to '127.0.0.1.key'
-----
echo "greeting" |  nc >server-netcat-client-libressl-server-nc.out  -l -c -C 127.0.0.1.crt -K 127.0.0.1.key  127.0.0.1 0 &  for i in `jot 1000`; do fstat -p $! >netcat.fstat;  grep -q ' stream tcp .*:[1-9][0-9]*$' netcat.fstat &&  exit 0; done; exit 1
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-netcat-client-libressl-server-nc.out  `sed -n 's/.* stream tcp .*:/127.0.0.1 /p' netcat.fstat`
# check that the client run successfully to the end
grep -q '^success$' client-netcat-client-libressl-server-nc.out
# client must have read server greeting
grep -q '^<<< greeting$' client-netcat-client-libressl-server-nc.out
# netstat server must have read client hello
grep -q '^hello$' server-netcat-client-libressl-server-nc.out

==== run-protocol-client-libressl ====
# check that LibTLS protocol version is TLS 1.2 or TLS 1.3
grep 'Protocol *: TLSv1.[23]' client-netcat-client-libressl-server-nc.out
    Protocol  : TLSv1.3

==== run-netcat-client-openssl11-server-nc ====
echo "greeting" |  nc >server-netcat-client-openssl11-server-nc.out  -l -c -C 127.0.0.1.crt -K 127.0.0.1.key  127.0.0.1 0 &  for i in `jot 1000`; do fstat -p $! >netcat.fstat;  grep -q ' stream tcp .*:[1-9][0-9]*$' netcat.fstat &&  exit 0; done; exit 1
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-netcat-client-openssl11-server-nc.out  `sed -n 's/.* stream tcp .*:/127.0.0.1 /p' netcat.fstat`
# check that the client run successfully to the end
grep -q '^success$' client-netcat-client-openssl11-server-nc.out
# client must have read server greeting
grep -q '^<<< greeting$' client-netcat-client-openssl11-server-nc.out
# netstat server must have read client hello
grep -q '^hello$' server-netcat-client-openssl11-server-nc.out

==== run-protocol-client-openssl11 ====
# check that LibTLS protocol version is TLS 1.2 or TLS 1.3
grep 'Protocol *: TLSv1.[23]' client-netcat-client-openssl11-server-nc.out
    Protocol  : TLSv1.3

==== run-netcat-client-openssl31-server-nc ====
echo "greeting" |  nc >server-netcat-client-openssl31-server-nc.out  -l -c -C 127.0.0.1.crt -K 127.0.0.1.key  127.0.0.1 0 &  for i in `jot 1000`; do fstat -p $! >netcat.fstat;  grep -q ' stream tcp .*:[1-9][0-9]*$' netcat.fstat &&  exit 0; done; exit 1
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-netcat-client-openssl31-server-nc.out  `sed -n 's/.* stream tcp .*:/127.0.0.1 /p' netcat.fstat`
# check that the client run successfully to the end
grep -q '^success$' client-netcat-client-openssl31-server-nc.out
# client must have read server greeting
grep -q '^<<< greeting$' client-netcat-client-openssl31-server-nc.out
# netstat server must have read client hello
grep -q '^hello$' server-netcat-client-openssl31-server-nc.out

==== run-protocol-client-openssl31 ====
# check that LibTLS protocol version is TLS 1.2 or TLS 1.3
grep 'Protocol *: TLSv1.[23]' client-netcat-client-openssl31-server-nc.out
    Protocol  : TLSv1.3

==== run-netcat-client-nc-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-netcat-client-nc-server-libressl.out  127.0.0.1 0
echo "hello" |  nc >client-netcat-client-nc-server-libressl.out  -c -R 127.0.0.1.crt  `sed -n 's/listen sock: //p' server-netcat-client-nc-server-libressl.out`
# check that the server child run successfully to the end
grep -q '^success$' server-netcat-client-nc-server-libressl.out ||  { sleep 1; grep -q '^success$' server-netcat-client-nc-server-libressl.out; }
# server must have read client hello
grep -q '^<<< hello$' server-netcat-client-nc-server-libressl.out
# client must have read server greeting
grep -q '^greeting$' client-netcat-client-nc-server-libressl.out

==== run-netcat-client-nc-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-netcat-client-nc-server-openssl11.out  127.0.0.1 0
echo "hello" |  nc >client-netcat-client-nc-server-openssl11.out  -c -R 127.0.0.1.crt  `sed -n 's/listen sock: //p' server-netcat-client-nc-server-openssl11.out`
# check that the server child run successfully to the end
grep -q '^success$' server-netcat-client-nc-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-netcat-client-nc-server-openssl11.out; }
# server must have read client hello
grep -q '^<<< hello$' server-netcat-client-nc-server-openssl11.out
# client must have read server greeting
grep -q '^greeting$' client-netcat-client-nc-server-openssl11.out

==== run-netcat-client-nc-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-netcat-client-nc-server-openssl31.out  127.0.0.1 0
echo "hello" |  nc >client-netcat-client-nc-server-openssl31.out  -c -R 127.0.0.1.crt  `sed -n 's/listen sock: //p' server-netcat-client-nc-server-openssl31.out`
# check that the server child run successfully to the end
grep -q '^success$' server-netcat-client-nc-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-netcat-client-nc-server-openssl31.out; }
# server must have read client hello
grep -q '^<<< hello$' server-netcat-client-nc-server-openssl31.out
# client must have read server greeting
grep -q '^greeting$' client-netcat-client-nc-server-openssl31.out

==== run-protocol-client-libressl ====
# check that LibTLS protocol version is TLS 1.2 or TLS 1.3
grep 'Protocol *: TLSv1.[23]' client-netcat-client-libressl-server-nc.out
    Protocol  : TLSv1.3

==== run-protocol-client-openssl11 ====
# check that LibTLS protocol version is TLS 1.2 or TLS 1.3
grep 'Protocol *: TLSv1.[23]' client-netcat-client-openssl11-server-nc.out
    Protocol  : TLSv1.3

==== run-protocol-client-openssl31 ====
# check that LibTLS protocol version is TLS 1.2 or TLS 1.3
grep 'Protocol *: TLSv1.[23]' client-netcat-client-openssl31-server-nc.out
    Protocol  : TLSv1.3

==== run-protocol-server-libressl ====
# check that LibTLS protocol version is TLS 1.2 or TLS 1.3
grep 'Protocol *: TLSv1.[23]' server-netcat-client-nc-server-libressl.out
    Protocol  : TLSv1.3

==== run-protocol-server-openssl11 ====
# check that LibTLS protocol version is TLS 1.2 or TLS 1.3
grep 'Protocol *: TLSv1.[23]' server-netcat-client-nc-server-openssl11.out
    Protocol  : TLSv1.3

==== run-protocol-server-openssl31 ====
# check that LibTLS protocol version is TLS 1.2 or TLS 1.3
grep 'Protocol *: TLSv1.[23]' server-netcat-client-nc-server-openssl31.out
    Protocol  : TLSv1.3

===> session
==== run-session-client-libressl-server-libressl ====
openssl req -batch -new  -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/  -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt
Generating a 2048 bit RSA private key
.........................................................................
...........
writing new private key to '127.0.0.1.key'
-----
# TLS 1.3 needs some extra setup for session reuse
DISABLED

==== run-session-client-libressl-server-openssl11 ====
# TLS 1.3 needs some extra setup for session reuse
DISABLED

==== run-session-client-openssl11-server-libressl ====
# TLS 1.3 needs some extra setup for session reuse
DISABLED

==== run-session-client-openssl11-server-openssl11 ====
# TLS 1.3 needs some extra setup for session reuse
DISABLED

===> botan
Run "pkg_add botan2" to run tests against Botan 2
SKIPPED
===> version
==== run-version-client-libressl-any-server-libressl-any ====
openssl req -batch -new  -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/  -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt
Generating a 2048 bit RSA private key
...........
.....
writing new private key to '127.0.0.1.key'
-----
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-version-client-libressl-any-server-libressl-any.out  -c 127.0.0.1.crt -k 127.0.0.1.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-version-client-libressl-any-server-libressl-any.out    `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-libressl-any.out`
grep -q '^success$' server-version-client-libressl-any-server-libressl-any.out ||  { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-libressl-any.out; }
grep -q '^success$' client-version-client-libressl-any-server-libressl-any.out

==== check-version-client-libressl-any-server-libressl-any ====
    Protocol  : TLSv1.3
    Protocol  : TLSv1.3
grep -q ' Protocol *: TLSv1.3$' client-version-client-libressl-any-server-libressl-any.out
grep -q ' Protocol *: TLSv1.3$' server-version-client-libressl-any-server-libressl-any.out

==== run-version-client-libressl-any-server-openssl11-any ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-version-client-libressl-any-server-openssl11-any.out  -c 127.0.0.1.crt -k 127.0.0.1.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-version-client-libressl-any-server-openssl11-any.out    `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-openssl11-any.out`
grep -q '^success$' server-version-client-libressl-any-server-openssl11-any.out ||  { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-openssl11-any.out; }
grep -q '^success$' client-version-client-libressl-any-server-openssl11-any.out

==== check-version-client-libressl-any-server-openssl11-any ====
    Protocol  : TLSv1.3
    Protocol  : TLSv1.3
grep -q ' Protocol *: TLSv1.3$' client-version-client-libressl-any-server-openssl11-any.out
grep -q ' Protocol *: TLSv1.3$' server-version-client-libressl-any-server-openssl11-any.out

==== run-version-client-openssl11-any-server-libressl-any ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-version-client-openssl11-any-server-libressl-any.out  -c 127.0.0.1.crt -k 127.0.0.1.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-version-client-openssl11-any-server-libressl-any.out    `sed -n 's/listen sock: //p' server-version-client-openssl11-any-server-libressl-any.out`
grep -q '^success$' server-version-client-openssl11-any-server-libressl-any.out ||  { sleep 1; grep -q '^success$' server-version-client-openssl11-any-server-libressl-any.out; }
grep -q '^success$' client-version-client-openssl11-any-server-libressl-any.out

==== check-version-client-openssl11-any-server-libressl-any ====
    Protocol  : TLSv1.3
    Protocol  : TLSv1.3
grep -q ' Protocol *: TLSv1.3$' client-version-client-openssl11-any-server-libressl-any.out
grep -q ' Protocol *: TLSv1.3$' server-version-client-openssl11-any-server-libressl-any.out

==== run-version-client-libressl-any-server-libressl-TLS1_2 ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-version-client-libressl-any-server-libressl-TLS1_2.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -V TLS1_2  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-version-client-libressl-any-server-libressl-TLS1_2.out    `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-libressl-TLS1_2.out`
grep -q '^success$' server-version-client-libressl-any-server-libressl-TLS1_2.out ||  { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-libressl-TLS1_2.out; }
grep -q '^success$' client-version-client-libressl-any-server-libressl-TLS1_2.out

==== check-version-client-libressl-any-server-libressl-TLS1_2 ====
    Protocol  : TLSv1.2
    Protocol  : TLSv1.2
grep -q ' Protocol *: TLSv1.2$'  client-version-client-libressl-any-server-libressl-TLS1_2.out
grep -q ' Protocol *: TLSv1.2$'  server-version-client-libressl-any-server-libressl-TLS1_2.out

==== run-version-client-libressl-any-server-openssl11-TLS1_2 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-version-client-libressl-any-server-openssl11-TLS1_2.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -V TLS1_2  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-version-client-libressl-any-server-openssl11-TLS1_2.out    `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-openssl11-TLS1_2.out`
grep -q '^success$' server-version-client-libressl-any-server-openssl11-TLS1_2.out ||  { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-openssl11-TLS1_2.out; }
grep -q '^success$' client-version-client-libressl-any-server-openssl11-TLS1_2.out

==== check-version-client-libressl-any-server-openssl11-TLS1_2 ====
    Protocol  : TLSv1.2
    Protocol  : TLSv1.2
grep -q ' Protocol *: TLSv1.2$'  client-version-client-libressl-any-server-openssl11-TLS1_2.out
grep -q ' Protocol *: TLSv1.2$'  server-version-client-libressl-any-server-openssl11-TLS1_2.out

==== run-version-client-openssl11-any-server-libressl-TLS1_2 ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-version-client-openssl11-any-server-libressl-TLS1_2.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -V TLS1_2  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-version-client-openssl11-any-server-libressl-TLS1_2.out    `sed -n 's/listen sock: //p' server-version-client-openssl11-any-server-libressl-TLS1_2.out`
grep -q '^success$' server-version-client-openssl11-any-server-libressl-TLS1_2.out ||  { sleep 1; grep -q '^success$' server-version-client-openssl11-any-server-libressl-TLS1_2.out; }
grep -q '^success$' client-version-client-openssl11-any-server-libressl-TLS1_2.out

==== check-version-client-openssl11-any-server-libressl-TLS1_2 ====
    Protocol  : TLSv1.2
    Protocol  : TLSv1.2
grep -q ' Protocol *: TLSv1.2$'  client-version-client-openssl11-any-server-libressl-TLS1_2.out
grep -q ' Protocol *: TLSv1.2$'  server-version-client-openssl11-any-server-libressl-TLS1_2.out

==== run-version-client-libressl-TLS1_2-server-libressl-any ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-version-client-libressl-TLS1_2-server-libressl-any.out  -c 127.0.0.1.crt -k 127.0.0.1.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-version-client-libressl-TLS1_2-server-libressl-any.out  -V TLS1_2  `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-libressl-any.out`
grep -q '^success$' server-version-client-libressl-TLS1_2-server-libressl-any.out ||  { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_2-server-libressl-any.out; }
grep -q '^success$' client-version-client-libressl-TLS1_2-server-libressl-any.out

==== check-version-client-libressl-TLS1_2-server-libressl-any ====
    Protocol  : TLSv1.2
    Protocol  : TLSv1.2
grep -q ' Protocol *: TLSv1.2$'  client-version-client-libressl-TLS1_2-server-libressl-any.out
grep -q ' Protocol *: TLSv1.2$'  server-version-client-libressl-TLS1_2-server-libressl-any.out

==== run-version-client-libressl-TLS1_2-server-openssl11-any ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-version-client-libressl-TLS1_2-server-openssl11-any.out  -c 127.0.0.1.crt -k 127.0.0.1.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-version-client-libressl-TLS1_2-server-openssl11-any.out  -V TLS1_2  `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-openssl11-any.out`
grep -q '^success$' server-version-client-libressl-TLS1_2-server-openssl11-any.out ||  { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_2-server-openssl11-any.out; }
grep -q '^success$' client-version-client-libressl-TLS1_2-server-openssl11-any.out

==== check-version-client-libressl-TLS1_2-server-openssl11-any ====
    Protocol  : TLSv1.2
    Protocol  : TLSv1.2
grep -q ' Protocol *: TLSv1.2$'  client-version-client-libressl-TLS1_2-server-openssl11-any.out
grep -q ' Protocol *: TLSv1.2$'  server-version-client-libressl-TLS1_2-server-openssl11-any.out

==== run-version-client-openssl11-TLS1_2-server-libressl-any ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-version-client-openssl11-TLS1_2-server-libressl-any.out  -c 127.0.0.1.crt -k 127.0.0.1.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-version-client-openssl11-TLS1_2-server-libressl-any.out  -V TLS1_2  `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_2-server-libressl-any.out`
grep -q '^success$' server-version-client-openssl11-TLS1_2-server-libressl-any.out ||  { sleep 1; grep -q '^success$' server-version-client-openssl11-TLS1_2-server-libressl-any.out; }
grep -q '^success$' client-version-client-openssl11-TLS1_2-server-libressl-any.out

==== check-version-client-openssl11-TLS1_2-server-libressl-any ====
    Protocol  : TLSv1.2
    Protocol  : TLSv1.2
grep -q ' Protocol *: TLSv1.2$'  client-version-client-openssl11-TLS1_2-server-libressl-any.out
grep -q ' Protocol *: TLSv1.2$'  server-version-client-openssl11-TLS1_2-server-libressl-any.out

==== run-version-client-libressl-TLS1_2-server-libressl-TLS1_2 ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -V TLS1_2  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out  -V TLS1_2  `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out`
grep -q '^success$' server-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out ||  { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out; }
grep -q '^success$' client-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out

==== check-version-client-libressl-TLS1_2-server-libressl-TLS1_2 ====
    Protocol  : TLSv1.2
    Protocol  : TLSv1.2
grep -q ' Protocol *: TLSv1.2$'  client-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out
grep -q ' Protocol *: TLSv1.2$'  server-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out

==== run-version-client-libressl-TLS1_2-server-openssl11-TLS1_2 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -V TLS1_2  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out  -V TLS1_2  `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out`
grep -q '^success$' server-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out ||  { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out; }
grep -q '^success$' client-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out

==== check-version-client-libressl-TLS1_2-server-openssl11-TLS1_2 ====
    Protocol  : TLSv1.2
    Protocol  : TLSv1.2
grep -q ' Protocol *: TLSv1.2$'  client-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out
grep -q ' Protocol *: TLSv1.2$'  server-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out

==== run-version-client-libressl-TLS1_2-server-openssl31-TLS1_2 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-version-client-libressl-TLS1_2-server-openssl31-TLS1_2.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -V TLS1_2  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-version-client-libressl-TLS1_2-server-openssl31-TLS1_2.out  -V TLS1_2  `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-openssl31-TLS1_2.out`
grep -q '^success$' server-version-client-libressl-TLS1_2-server-openssl31-TLS1_2.out ||  { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_2-server-openssl31-TLS1_2.out; }
grep -q '^success$' client-version-client-libressl-TLS1_2-server-openssl31-TLS1_2.out

==== check-version-client-libressl-TLS1_2-server-openssl31-TLS1_2 ====
    Protocol  : TLSv1.2
    Protocol  : TLSv1.2
grep -q ' Protocol *: TLSv1.2$'  client-version-client-libressl-TLS1_2-server-openssl31-TLS1_2.out
grep -q ' Protocol *: TLSv1.2$'  server-version-client-libressl-TLS1_2-server-openssl31-TLS1_2.out

==== run-version-client-openssl11-TLS1_2-server-libressl-TLS1_2 ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -V TLS1_2  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out  -V TLS1_2  `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out`
grep -q '^success$' server-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out ||  { sleep 1; grep -q '^success$' server-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out; }
grep -q '^success$' client-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out

==== check-version-client-openssl11-TLS1_2-server-libressl-TLS1_2 ====
    Protocol  : TLSv1.2
    Protocol  : TLSv1.2
grep -q ' Protocol *: TLSv1.2$'  client-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out
grep -q ' Protocol *: TLSv1.2$'  server-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out

==== run-version-client-openssl31-TLS1_2-server-libressl-TLS1_2 ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-version-client-openssl31-TLS1_2-server-libressl-TLS1_2.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -V TLS1_2  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-version-client-openssl31-TLS1_2-server-libressl-TLS1_2.out  -V TLS1_2  `sed -n 's/listen sock: //p' server-version-client-openssl31-TLS1_2-server-libressl-TLS1_2.out`
grep -q '^success$' server-version-client-openssl31-TLS1_2-server-libressl-TLS1_2.out ||  { sleep 1; grep -q '^success$' server-version-client-openssl31-TLS1_2-server-libressl-TLS1_2.out; }
grep -q '^success$' client-version-client-openssl31-TLS1_2-server-libressl-TLS1_2.out

==== check-version-client-openssl31-TLS1_2-server-libressl-TLS1_2 ====
    Protocol  : TLSv1.2
    Protocol  : TLSv1.2
grep -q ' Protocol *: TLSv1.2$'  client-version-client-openssl31-TLS1_2-server-libressl-TLS1_2.out
grep -q ' Protocol *: TLSv1.2$'  server-version-client-openssl31-TLS1_2-server-libressl-TLS1_2.out

==== run-version-client-openssl11-any-server-openssl11-any ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-version-client-openssl11-any-server-openssl11-any.out  -c 127.0.0.1.crt -k 127.0.0.1.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-version-client-openssl11-any-server-openssl11-any.out    `sed -n 's/listen sock: //p' server-version-client-openssl11-any-server-openssl11-any.out`
grep -q '^success$' server-version-client-openssl11-any-server-openssl11-any.out ||  { sleep 1; grep -q '^success$' server-version-client-openssl11-any-server-openssl11-any.out; }
grep -q '^success$' client-version-client-openssl11-any-server-openssl11-any.out

==== check-version-client-openssl11-any-server-openssl11-any ====
    Protocol  : TLSv1.3
    Protocol  : TLSv1.3
grep -q ' Protocol *: TLSv1.3$' client-version-client-openssl11-any-server-openssl11-any.out
grep -q ' Protocol *: TLSv1.3$' server-version-client-openssl11-any-server-openssl11-any.out

==== run-version-client-openssl11-any-server-openssl11-TLS1_2 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-version-client-openssl11-any-server-openssl11-TLS1_2.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -V TLS1_2  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-version-client-openssl11-any-server-openssl11-TLS1_2.out    `sed -n 's/listen sock: //p' server-version-client-openssl11-any-server-openssl11-TLS1_2.out`
grep -q '^success$' server-version-client-openssl11-any-server-openssl11-TLS1_2.out ||  { sleep 1; grep -q '^success$' server-version-client-openssl11-any-server-openssl11-TLS1_2.out; }
grep -q '^success$' client-version-client-openssl11-any-server-openssl11-TLS1_2.out

==== check-version-client-openssl11-any-server-openssl11-TLS1_2 ====
    Protocol  : TLSv1.2
    Protocol  : TLSv1.2
grep -q ' Protocol *: TLSv1.2$'  client-version-client-openssl11-any-server-openssl11-TLS1_2.out
grep -q ' Protocol *: TLSv1.2$'  server-version-client-openssl11-any-server-openssl11-TLS1_2.out

==== run-version-client-openssl11-TLS1_2-server-openssl11-any ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-version-client-openssl11-TLS1_2-server-openssl11-any.out  -c 127.0.0.1.crt -k 127.0.0.1.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-version-client-openssl11-TLS1_2-server-openssl11-any.out  -V TLS1_2  `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_2-server-openssl11-any.out`
grep -q '^success$' server-version-client-openssl11-TLS1_2-server-openssl11-any.out ||  { sleep 1; grep -q '^success$' server-version-client-openssl11-TLS1_2-server-openssl11-any.out; }
grep -q '^success$' client-version-client-openssl11-TLS1_2-server-openssl11-any.out

==== check-version-client-openssl11-TLS1_2-server-openssl11-any ====
    Protocol  : TLSv1.2
    Protocol  : TLSv1.2
grep -q ' Protocol *: TLSv1.2$'  client-version-client-openssl11-TLS1_2-server-openssl11-any.out
grep -q ' Protocol *: TLSv1.2$'  server-version-client-openssl11-TLS1_2-server-openssl11-any.out

==== run-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -V TLS1_2  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out  -V TLS1_2  `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out`
grep -q '^success$' server-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out ||  { sleep 1; grep -q '^success$' server-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out; }
grep -q '^success$' client-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out

==== check-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2 ====
    Protocol  : TLSv1.2
    Protocol  : TLSv1.2
grep -q ' Protocol *: TLSv1.2$'  client-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out
grep -q ' Protocol *: TLSv1.2$'  server-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out

==== run-version-client-openssl11-TLS1_2-server-openssl31-TLS1_2 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-version-client-openssl11-TLS1_2-server-openssl31-TLS1_2.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -V TLS1_2  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-version-client-openssl11-TLS1_2-server-openssl31-TLS1_2.out  -V TLS1_2  `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_2-server-openssl31-TLS1_2.out`
grep -q '^success$' server-version-client-openssl11-TLS1_2-server-openssl31-TLS1_2.out ||  { sleep 1; grep -q '^success$' server-version-client-openssl11-TLS1_2-server-openssl31-TLS1_2.out; }
grep -q '^success$' client-version-client-openssl11-TLS1_2-server-openssl31-TLS1_2.out

==== check-version-client-openssl11-TLS1_2-server-openssl31-TLS1_2 ====
    Protocol  : TLSv1.2
    Protocol  : TLSv1.2
grep -q ' Protocol *: TLSv1.2$'  client-version-client-openssl11-TLS1_2-server-openssl31-TLS1_2.out
grep -q ' Protocol *: TLSv1.2$'  server-version-client-openssl11-TLS1_2-server-openssl31-TLS1_2.out

==== run-version-client-openssl31-TLS1_2-server-openssl11-TLS1_2 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-version-client-openssl31-TLS1_2-server-openssl11-TLS1_2.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -V TLS1_2  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-version-client-openssl31-TLS1_2-server-openssl11-TLS1_2.out  -V TLS1_2  `sed -n 's/listen sock: //p' server-version-client-openssl31-TLS1_2-server-openssl11-TLS1_2.out`
grep -q '^success$' server-version-client-openssl31-TLS1_2-server-openssl11-TLS1_2.out ||  { sleep 1; grep -q '^success$' server-version-client-openssl31-TLS1_2-server-openssl11-TLS1_2.out; }
grep -q '^success$' client-version-client-openssl31-TLS1_2-server-openssl11-TLS1_2.out

==== check-version-client-openssl31-TLS1_2-server-openssl11-TLS1_2 ====
    Protocol  : TLSv1.2
    Protocol  : TLSv1.2
grep -q ' Protocol *: TLSv1.2$'  client-version-client-openssl31-TLS1_2-server-openssl11-TLS1_2.out
grep -q ' Protocol *: TLSv1.2$'  server-version-client-openssl31-TLS1_2-server-openssl11-TLS1_2.out

==== run-version-client-openssl31-TLS1_2-server-openssl31-TLS1_2 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-version-client-openssl31-TLS1_2-server-openssl31-TLS1_2.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -V TLS1_2  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-version-client-openssl31-TLS1_2-server-openssl31-TLS1_2.out  -V TLS1_2  `sed -n 's/listen sock: //p' server-version-client-openssl31-TLS1_2-server-openssl31-TLS1_2.out`
grep -q '^success$' server-version-client-openssl31-TLS1_2-server-openssl31-TLS1_2.out ||  { sleep 1; grep -q '^success$' server-version-client-openssl31-TLS1_2-server-openssl31-TLS1_2.out; }
grep -q '^success$' client-version-client-openssl31-TLS1_2-server-openssl31-TLS1_2.out

==== check-version-client-openssl31-TLS1_2-server-openssl31-TLS1_2 ====
    Protocol  : TLSv1.2
    Protocol  : TLSv1.2
grep -q ' Protocol *: TLSv1.2$'  client-version-client-openssl31-TLS1_2-server-openssl31-TLS1_2.out
grep -q ' Protocol *: TLSv1.2$'  server-version-client-openssl31-TLS1_2-server-openssl31-TLS1_2.out

===> cipher
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client -l ALL -L >client-libressl.ciphers.tmp
sed -n 's/^cipher //p' <client-libressl.ciphers.tmp | sort -u >client-libressl.ciphers
rm client-libressl.ciphers.tmp
openssl req -batch -new  -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/  -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt
Generating a 2048 bit RSA private key
........
..........................
writing new private key to '127.0.0.1.key'
-----
openssl req -batch -new  -subj /L=OpenBSD/O=tls-regress/OU=ca/CN=root/  -nodes -newkey rsa -keyout ca.key -x509 -out ca.crt
Generating a 2048 bit RSA private key
....................................
................................................................
writing new private key to 'ca.key'
-----
openssl dsaparam -genkey -out dsa.key 2048
Generating DSA parameters, 2048 bit long prime
This could take some time
...........................................................................................................................*
.....................................................................................................................................................................................................................................................................................................................................*
openssl req -batch -new  -subj /L=OpenBSD/O=tls-regress/OU=dsa/CN=localhost/  -nodes -key dsa.key -out dsa.req
openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt  -req -in dsa.req -out dsa.crt
Signature ok
subject=/L=OpenBSD/O=tls-regress/OU=dsa/CN=localhost
openssl ecparam -genkey -name secp256r1 -out ec.key
using curve name prime256v1 instead of secp256r1
openssl req -batch -new  -subj /L=OpenBSD/O=tls-regress/OU=ec/CN=localhost/  -nodes -key ec.key -out ec.req
openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt  -req -in ec.req -out ec.crt
Signature ok
subject=/L=OpenBSD/O=tls-regress/OU=ec/CN=localhost
openssl genrsa -out rsa.key 2048
Generating RSA private key, 2048 bit long modulus
............................................
....................................................................
e is 65537 (0x010001)
openssl req -batch -new  -subj /L=OpenBSD/O=tls-regress/OU=rsa/CN=localhost/  -nodes -key rsa.key -out rsa.req
openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt  -req -in rsa.req -out rsa.crt
Signature ok
subject=/L=OpenBSD/O=tls-regress/OU=rsa/CN=localhost
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server -l ALL -L >server-libressl.ciphers.tmp
sed -n 's/^cipher //p' <server-libressl.ciphers.tmp | sort -u >server-libressl.ciphers
rm server-libressl.ciphers.tmp
# get ciphers shared between client and server
sort client-libressl.ciphers server-libressl.ciphers >client-libressl-server-libressl.ciphers.tmp
uniq -d <client-libressl-server-libressl.ciphers.tmp >client-libressl-server-libressl.ciphers
# we are only interested in ciphers supported by libressl
sort client-libressl-server-libressl.ciphers client-libressl.ciphers >client-libressl-server-libressl.ciphers.tmp
uniq -d <client-libressl-server-libressl.ciphers.tmp >client-libressl-server-libressl.ciphers
rm client-libressl-server-libressl.ciphers.tmp
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server -l ALL -L >server-openssl11.ciphers.tmp
sed -n 's/^cipher //p' <server-openssl11.ciphers.tmp | sort -u >server-openssl11.ciphers
rm server-openssl11.ciphers.tmp
# get ciphers shared between client and server
sort client-libressl.ciphers server-openssl11.ciphers >client-libressl-server-openssl11.ciphers.tmp
uniq -d <client-libressl-server-openssl11.ciphers.tmp >client-libressl-server-openssl11.ciphers
# we are only interested in ciphers supported by libressl
sort client-libressl-server-openssl11.ciphers client-libressl.ciphers >client-libressl-server-openssl11.ciphers.tmp
# OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers
sed -i '/^TLS_/d' client-libressl-server-openssl11.ciphers.tmp
uniq -d <client-libressl-server-openssl11.ciphers.tmp >client-libressl-server-openssl11.ciphers
rm client-libressl-server-openssl11.ciphers.tmp
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server -l ALL -L >server-openssl31.ciphers.tmp
sed -n 's/^cipher //p' <server-openssl31.ciphers.tmp | sort -u >server-openssl31.ciphers
rm server-openssl31.ciphers.tmp
# get ciphers shared between client and server
sort client-libressl.ciphers server-openssl31.ciphers >client-libressl-server-openssl31.ciphers.tmp
uniq -d <client-libressl-server-openssl31.ciphers.tmp >client-libressl-server-openssl31.ciphers
# we are only interested in ciphers supported by libressl
sort client-libressl-server-openssl31.ciphers client-libressl.ciphers >client-libressl-server-openssl31.ciphers.tmp
# OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers
sed -i '/^TLS_/d' client-libressl-server-openssl31.ciphers.tmp
uniq -d <client-libressl-server-openssl31.ciphers.tmp >client-libressl-server-openssl31.ciphers
rm client-libressl-server-openssl31.ciphers.tmp
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client -l ALL -L >client-openssl11.ciphers.tmp
sed -n 's/^cipher //p' <client-openssl11.ciphers.tmp | sort -u >client-openssl11.ciphers
rm client-openssl11.ciphers.tmp
# get ciphers shared between client and server
sort client-openssl11.ciphers server-libressl.ciphers >client-openssl11-server-libressl.ciphers.tmp
uniq -d <client-openssl11-server-libressl.ciphers.tmp >client-openssl11-server-libressl.ciphers
# we are only interested in ciphers supported by libressl
sort client-openssl11-server-libressl.ciphers client-libressl.ciphers >client-openssl11-server-libressl.ciphers.tmp
# OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers
sed -i '/^TLS_/d' client-openssl11-server-libressl.ciphers.tmp
uniq -d <client-openssl11-server-libressl.ciphers.tmp >client-openssl11-server-libressl.ciphers
rm client-openssl11-server-libressl.ciphers.tmp
# get ciphers shared between client and server
sort client-openssl11.ciphers server-openssl11.ciphers >client-openssl11-server-openssl11.ciphers.tmp
uniq -d <client-openssl11-server-openssl11.ciphers.tmp >client-openssl11-server-openssl11.ciphers
# we are only interested in ciphers supported by libressl
sort client-openssl11-server-openssl11.ciphers client-libressl.ciphers >client-openssl11-server-openssl11.ciphers.tmp
# OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers
sed -i '/^TLS_/d' client-openssl11-server-openssl11.ciphers.tmp
uniq -d <client-openssl11-server-openssl11.ciphers.tmp >client-openssl11-server-openssl11.ciphers
rm client-openssl11-server-openssl11.ciphers.tmp
# get ciphers shared between client and server
sort client-openssl11.ciphers server-openssl31.ciphers >client-openssl11-server-openssl31.ciphers.tmp
uniq -d <client-openssl11-server-openssl31.ciphers.tmp >client-openssl11-server-openssl31.ciphers
# we are only interested in ciphers supported by libressl
sort client-openssl11-server-openssl31.ciphers client-libressl.ciphers >client-openssl11-server-openssl31.ciphers.tmp
# OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers
sed -i '/^TLS_/d' client-openssl11-server-openssl31.ciphers.tmp
uniq -d <client-openssl11-server-openssl31.ciphers.tmp >client-openssl11-server-openssl31.ciphers
rm client-openssl11-server-openssl31.ciphers.tmp
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client -l ALL -L >client-openssl31.ciphers.tmp
sed -n 's/^cipher //p' <client-openssl31.ciphers.tmp | sort -u >client-openssl31.ciphers
rm client-openssl31.ciphers.tmp
# get ciphers shared between client and server
sort client-openssl31.ciphers server-libressl.ciphers >client-openssl31-server-libressl.ciphers.tmp
uniq -d <client-openssl31-server-libressl.ciphers.tmp >client-openssl31-server-libressl.ciphers
# we are only interested in ciphers supported by libressl
sort client-openssl31-server-libressl.ciphers client-libressl.ciphers >client-openssl31-server-libressl.ciphers.tmp
# OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers
sed -i '/^TLS_/d' client-openssl31-server-libressl.ciphers.tmp
uniq -d <client-openssl31-server-libressl.ciphers.tmp >client-openssl31-server-libressl.ciphers
rm client-openssl31-server-libressl.ciphers.tmp
# get ciphers shared between client and server
sort client-openssl31.ciphers server-openssl11.ciphers >client-openssl31-server-openssl11.ciphers.tmp
uniq -d <client-openssl31-server-openssl11.ciphers.tmp >client-openssl31-server-openssl11.ciphers
# we are only interested in ciphers supported by libressl
sort client-openssl31-server-openssl11.ciphers client-libressl.ciphers >client-openssl31-server-openssl11.ciphers.tmp
# OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers
sed -i '/^TLS_/d' client-openssl31-server-openssl11.ciphers.tmp
uniq -d <client-openssl31-server-openssl11.ciphers.tmp >client-openssl31-server-openssl11.ciphers
rm client-openssl31-server-openssl11.ciphers.tmp
# get ciphers shared between client and server
sort client-openssl31.ciphers server-openssl31.ciphers >client-openssl31-server-openssl31.ciphers.tmp
uniq -d <client-openssl31-server-openssl31.ciphers.tmp >client-openssl31-server-openssl31.ciphers
# we are only interested in ciphers supported by libressl
sort client-openssl31-server-openssl31.ciphers client-libressl.ciphers >client-openssl31-server-openssl31.ciphers.tmp
# OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers
sed -i '/^TLS_/d' client-openssl31-server-openssl31.ciphers.tmp
uniq -d <client-openssl31-server-openssl31.ciphers.tmp >client-openssl31-server-openssl31.ciphers
rm client-openssl31-server-openssl31.ciphers.tmp
rm -f ciphers.mk ciphers.mk.tmp
echo 'CIPHERS_libressl_libressl =' >>ciphers.mk.tmp  `cat client-libressl-server-libressl.ciphers`
echo 'CIPHERS_libressl_openssl11 =' >>ciphers.mk.tmp  `cat client-libressl-server-openssl11.ciphers`
echo 'CIPHERS_libressl_openssl31 =' >>ciphers.mk.tmp  `cat client-libressl-server-openssl31.ciphers`
echo 'CIPHERS_openssl11_libressl =' >>ciphers.mk.tmp  `cat client-openssl11-server-libressl.ciphers`
echo 'CIPHERS_openssl11_openssl11 =' >>ciphers.mk.tmp  `cat client-openssl11-server-openssl11.ciphers`
echo 'CIPHERS_openssl11_openssl31 =' >>ciphers.mk.tmp  `cat client-openssl11-server-openssl31.ciphers`
echo 'CIPHERS_openssl31_libressl =' >>ciphers.mk.tmp  `cat client-openssl31-server-libressl.ciphers`
echo 'CIPHERS_openssl31_openssl11 =' >>ciphers.mk.tmp  `cat client-openssl31-server-openssl11.ciphers`
echo 'CIPHERS_openssl31_openssl31 =' >>ciphers.mk.tmp  `cat client-openssl31-server-openssl31.ciphers`
mv ciphers.mk.tmp ciphers.mk
==== run-cipher-AES128-GCM-SHA256-client-libressl-server-libressl ====
openssl dhparam -out dh.param 1024
Generating DH parameters, 1024 bit long safe prime, generator 2
This is going to take a long time
.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................*
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out  -l AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out

==== check-cipher-AES128-GCM-SHA256-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out

==== run-cipher-AES128-SHA-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-AES128-SHA-client-libressl-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-AES128-SHA-client-libressl-server-libressl.out  -l AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-AES128-SHA-client-libressl-server-libressl.out

==== check-cipher-AES128-SHA-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-SHA-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-SHA-client-libressl-server-libressl.out

==== run-cipher-AES128-SHA256-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-AES128-SHA256-client-libressl-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-AES128-SHA256-client-libressl-server-libressl.out  -l AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-AES128-SHA256-client-libressl-server-libressl.out

==== check-cipher-AES128-SHA256-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-SHA256-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-SHA256-client-libressl-server-libressl.out

==== run-cipher-AES256-GCM-SHA384-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out  -l AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out

==== check-cipher-AES256-GCM-SHA384-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out

==== run-cipher-AES256-SHA-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-AES256-SHA-client-libressl-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-AES256-SHA-client-libressl-server-libressl.out  -l AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-AES256-SHA-client-libressl-server-libressl.out

==== check-cipher-AES256-SHA-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-SHA-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-SHA-client-libressl-server-libressl.out

==== run-cipher-AES256-SHA256-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-AES256-SHA256-client-libressl-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-AES256-SHA256-client-libressl-server-libressl.out  -l AES256-SHA256  `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-AES256-SHA256-client-libressl-server-libressl.out

==== check-cipher-AES256-SHA256-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-SHA256-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-SHA256-client-libressl-server-libressl.out

==== run-cipher-CAMELLIA128-SHA-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out  -l CAMELLIA128-SHA  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out

==== check-cipher-CAMELLIA128-SHA-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out

==== run-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out  -l CAMELLIA128-SHA256  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out

==== check-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out

==== run-cipher-CAMELLIA256-SHA-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out  -l CAMELLIA256-SHA  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out

==== check-cipher-CAMELLIA256-SHA-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out

==== run-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out  -l CAMELLIA256-SHA256  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out

==== check-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out

==== run-cipher-DES-CBC3-SHA-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l DES-CBC3-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out  -l DES-CBC3-SHA  `sed -n 's/listen sock: //p' server-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out

==== check-cipher-DES-CBC3-SHA-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out

==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out  -l DHE-RSA-AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out

==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out

==== run-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out  -l DHE-RSA-AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out

==== check-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out

==== run-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out  -l DHE-RSA-AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out

==== check-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out

==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out  -l DHE-RSA-AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out

==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out

==== run-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out  -l DHE-RSA-AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out

==== check-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out

==== run-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out  -l DHE-RSA-AES256-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out

==== check-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out

==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out  -l DHE-RSA-CAMELLIA128-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out

==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out

==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out  -l DHE-RSA-CAMELLIA128-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out

==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out

==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out  -l DHE-RSA-CAMELLIA256-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out

==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out

==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out  -l DHE-RSA-CAMELLIA256-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out

==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out

==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CHACHA20-POLY1305   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out  -l DHE-RSA-CHACHA20-POLY1305  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out

==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out

==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out  -l ECDHE-ECDSA-AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out

==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out

==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out  -l ECDHE-ECDSA-AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out

==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out

==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out  -l ECDHE-ECDSA-AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out

==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out

==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out  -l ECDHE-ECDSA-AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out

==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out

==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out  -l ECDHE-ECDSA-AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out

==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out

==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out  -l ECDHE-ECDSA-AES256-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out

==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out

==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-CHACHA20-POLY1305   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out  -l ECDHE-ECDSA-CHACHA20-POLY1305  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out

==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out

==== run-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-DES-CBC3-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out  -l ECDHE-ECDSA-DES-CBC3-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out

==== check-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out

==== run-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-RC4-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out  -l ECDHE-ECDSA-RC4-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out

==== check-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out

==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out  -l ECDHE-RSA-AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out

==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out

==== run-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out  -l ECDHE-RSA-AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out

==== check-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out

==== run-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out  -l ECDHE-RSA-AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out

==== check-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out

==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out  -l ECDHE-RSA-AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out

==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out

==== run-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out  -l ECDHE-RSA-AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out

==== check-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out

==== run-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out  -l ECDHE-RSA-AES256-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out

==== check-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out

==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-CHACHA20-POLY1305   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out  -l ECDHE-RSA-CHACHA20-POLY1305  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out

==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out

==== run-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-DES-CBC3-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out  -l ECDHE-RSA-DES-CBC3-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out

==== check-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out

==== run-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-RC4-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out  -l ECDHE-RSA-RC4-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out

==== check-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out

==== run-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out  -c rsa.crt -k rsa.key  -l EDH-RSA-DES-CBC3-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out  -l EDH-RSA-DES-CBC3-SHA  `sed -n 's/listen sock: //p' server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out

==== check-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out

==== run-cipher-RC4-SHA-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-RC4-SHA-client-libressl-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l RC4-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-RC4-SHA-client-libressl-server-libressl.out  -l RC4-SHA  `sed -n 's/listen sock: //p' server-cipher-RC4-SHA-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-RC4-SHA-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-RC4-SHA-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-RC4-SHA-client-libressl-server-libressl.out

==== check-cipher-RC4-SHA-client-libressl-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-RC4-SHA-client-libressl-server-libressl.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-RC4-SHA-client-libressl-server-libressl.out

==== run-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l TLS_AES_128_GCM_SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out  -l TLS_AES_128_GCM_SHA256  `sed -n 's/listen sock: //p' server-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out

==== check-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl ====
grep -q ' Cipher *: TLS_AES_128_GCM_SHA256$' client-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out
grep -q ' Cipher *: TLS_AES_128_GCM_SHA256$' server-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out

==== run-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l TLS_AES_256_GCM_SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out  -l TLS_AES_256_GCM_SHA384  `sed -n 's/listen sock: //p' server-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out

==== check-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl ====
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out

==== run-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l TLS_CHACHA20_POLY1305_SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out  -l TLS_CHACHA20_POLY1305_SHA256  `sed -n 's/listen sock: //p' server-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out`
grep -q '^success$' server-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out; }
grep -q '^success$' client-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out

==== check-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl ====
grep -q ' Cipher *: TLS_CHACHA20_POLY1305_SHA256$' client-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out
grep -q ' Cipher *: TLS_CHACHA20_POLY1305_SHA256$' server-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out

==== run-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-GCM-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out  -l AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out

==== check-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out

==== run-cipher-AES128-SHA-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-AES128-SHA-client-libressl-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-AES128-SHA-client-libressl-server-openssl11.out  -l AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-AES128-SHA-client-libressl-server-openssl11.out

==== check-cipher-AES128-SHA-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-SHA-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-SHA-client-libressl-server-openssl11.out

==== run-cipher-AES128-SHA256-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-AES128-SHA256-client-libressl-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-AES128-SHA256-client-libressl-server-openssl11.out  -l AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-AES128-SHA256-client-libressl-server-openssl11.out

==== check-cipher-AES128-SHA256-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-SHA256-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-SHA256-client-libressl-server-openssl11.out

==== run-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-GCM-SHA384,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out  -l AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out

==== check-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out

==== run-cipher-AES256-SHA-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-AES256-SHA-client-libressl-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-AES256-SHA-client-libressl-server-openssl11.out  -l AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-AES256-SHA-client-libressl-server-openssl11.out

==== check-cipher-AES256-SHA-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-SHA-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-SHA-client-libressl-server-openssl11.out

==== run-cipher-AES256-SHA256-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-AES256-SHA256-client-libressl-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-AES256-SHA256-client-libressl-server-openssl11.out  -l AES256-SHA256  `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-AES256-SHA256-client-libressl-server-openssl11.out

==== check-cipher-AES256-SHA256-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-SHA256-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-SHA256-client-libressl-server-openssl11.out

==== run-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA128-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out  -l CAMELLIA128-SHA  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out

==== check-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out

==== run-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA128-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out  -l CAMELLIA128-SHA256  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out

==== check-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out

==== run-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA256-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out  -l CAMELLIA256-SHA  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out

==== check-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out

==== run-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA256-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out  -l CAMELLIA256-SHA256  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out

==== check-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out

==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out  -l DHE-RSA-AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out

==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out

==== run-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out  -l DHE-RSA-AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out

==== check-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out

==== run-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out  -l DHE-RSA-AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out

==== check-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out

==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out  -l DHE-RSA-AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out

==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out

==== run-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out  -l DHE-RSA-AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out

==== check-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out

==== run-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out  -l DHE-RSA-AES256-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out

==== check-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out

==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out  -l DHE-RSA-CAMELLIA128-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out

==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out

==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out  -l DHE-RSA-CAMELLIA128-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out

==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out

==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out  -l DHE-RSA-CAMELLIA256-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out

==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out

==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out  -l DHE-RSA-CAMELLIA256-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out

==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out

==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out  -l DHE-RSA-CHACHA20-POLY1305  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out

==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out

==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out  -l ECDHE-ECDSA-AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out

==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out

==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out  -l ECDHE-ECDSA-AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out

==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out

==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out  -l ECDHE-ECDSA-AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out

==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out

==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out  -l ECDHE-ECDSA-AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out

==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out

==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out  -l ECDHE-ECDSA-AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out

==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out

==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out  -l ECDHE-ECDSA-AES256-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out

==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out

==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out  -l ECDHE-ECDSA-CHACHA20-POLY1305  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out

==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out

==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out  -l ECDHE-RSA-AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out

==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out

==== run-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out  -l ECDHE-RSA-AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out

==== check-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out

==== run-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out  -l ECDHE-RSA-AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out

==== check-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out

==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out  -l ECDHE-RSA-AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out

==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out

==== run-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out  -l ECDHE-RSA-AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out

==== check-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out

==== run-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out  -l ECDHE-RSA-AES256-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out

==== check-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out

==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out  -l ECDHE-RSA-CHACHA20-POLY1305  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out

==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out

==== run-cipher-AES128-GCM-SHA256-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl31.out  -l AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl31.out

==== check-cipher-AES128-GCM-SHA256-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl31.out

==== run-cipher-AES128-SHA-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-AES128-SHA-client-libressl-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-AES128-SHA-client-libressl-server-openssl31.out  -l AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-AES128-SHA-client-libressl-server-openssl31.out

==== check-cipher-AES128-SHA-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-SHA-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-SHA-client-libressl-server-openssl31.out

==== run-cipher-AES128-SHA256-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-AES128-SHA256-client-libressl-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-AES128-SHA256-client-libressl-server-openssl31.out  -l AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-AES128-SHA256-client-libressl-server-openssl31.out

==== check-cipher-AES128-SHA256-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-SHA256-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-SHA256-client-libressl-server-openssl31.out

==== run-cipher-AES256-GCM-SHA384-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl31.out  -l AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl31.out

==== check-cipher-AES256-GCM-SHA384-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl31.out

==== run-cipher-AES256-SHA-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-AES256-SHA-client-libressl-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-AES256-SHA-client-libressl-server-openssl31.out  -l AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-AES256-SHA-client-libressl-server-openssl31.out

==== check-cipher-AES256-SHA-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-SHA-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-SHA-client-libressl-server-openssl31.out

==== run-cipher-AES256-SHA256-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-AES256-SHA256-client-libressl-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-AES256-SHA256-client-libressl-server-openssl31.out  -l AES256-SHA256  `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-AES256-SHA256-client-libressl-server-openssl31.out

==== check-cipher-AES256-SHA256-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-SHA256-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-SHA256-client-libressl-server-openssl31.out

==== run-cipher-CAMELLIA128-SHA-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl31.out  -l CAMELLIA128-SHA  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl31.out

==== check-cipher-CAMELLIA128-SHA-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl31.out

==== run-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl31.out  -l CAMELLIA128-SHA256  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl31.out

==== check-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl31.out

==== run-cipher-CAMELLIA256-SHA-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl31.out  -l CAMELLIA256-SHA  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl31.out

==== check-cipher-CAMELLIA256-SHA-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl31.out

==== run-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl31.out  -l CAMELLIA256-SHA256  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl31.out

==== check-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl31.out

==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out  -l DHE-RSA-AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out

==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out

==== run-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl31.out  -l DHE-RSA-AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl31.out

==== check-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl31.out

==== run-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl31.out  -l DHE-RSA-AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl31.out

==== check-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl31.out

==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out  -l DHE-RSA-AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out

==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out

==== run-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl31.out  -l DHE-RSA-AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl31.out

==== check-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl31.out

==== run-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl31.out  -l DHE-RSA-AES256-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl31.out

==== check-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl31.out

==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl31.out  -l DHE-RSA-CAMELLIA128-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl31.out

==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl31.out

==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl31.out  -l DHE-RSA-CAMELLIA128-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl31.out

==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl31.out

==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl31.out  -l DHE-RSA-CAMELLIA256-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl31.out

==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl31.out

==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl31.out  -l DHE-RSA-CAMELLIA256-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl31.out

==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl31.out

==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CHACHA20-POLY1305   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out  -l DHE-RSA-CHACHA20-POLY1305  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out

==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out

==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out  -l ECDHE-ECDSA-AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out

==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out

==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl31.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl31.out  -l ECDHE-ECDSA-AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl31.out

==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl31.out

==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl31.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl31.out  -l ECDHE-ECDSA-AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl31.out

==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl31.out

==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out  -l ECDHE-ECDSA-AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out

==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out

==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl31.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl31.out  -l ECDHE-ECDSA-AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl31.out

==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl31.out

==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl31.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl31.out  -l ECDHE-ECDSA-AES256-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl31.out

==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl31.out

==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-CHACHA20-POLY1305   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out  -l ECDHE-ECDSA-CHACHA20-POLY1305  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out

==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out

==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out  -l ECDHE-RSA-AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out

==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl31.out

==== run-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl31.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl31.out  -l ECDHE-RSA-AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl31.out

==== check-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl31.out

==== run-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl31.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl31.out  -l ECDHE-RSA-AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl31.out

==== check-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl31.out

==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out  -l ECDHE-RSA-AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out

==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl31.out

==== run-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl31.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl31.out  -l ECDHE-RSA-AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl31.out

==== check-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl31.out

==== run-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl31.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl31.out  -l ECDHE-RSA-AES256-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl31.out

==== check-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl31.out

==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-CHACHA20-POLY1305   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out  -l ECDHE-RSA-CHACHA20-POLY1305  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out

==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out
# libressl client may prefer chacha-poly if aes-ni is not supported
egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl31.out

==== run-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out  -l AES128-GCM-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out

==== check-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out

==== run-cipher-AES128-SHA-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-AES128-SHA-client-openssl11-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-AES128-SHA-client-openssl11-server-libressl.out  -l AES128-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-AES128-SHA-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-AES128-SHA-client-openssl11-server-libressl.out

==== check-cipher-AES128-SHA-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA-client-openssl11-server-libressl.out

==== run-cipher-AES128-SHA256-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-AES128-SHA256-client-openssl11-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-AES128-SHA256-client-openssl11-server-libressl.out  -l AES128-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-AES128-SHA256-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-AES128-SHA256-client-openssl11-server-libressl.out

==== check-cipher-AES128-SHA256-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA256-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA256-client-openssl11-server-libressl.out

==== run-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out  -l AES256-GCM-SHA384,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out

==== check-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out

==== run-cipher-AES256-SHA-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-AES256-SHA-client-openssl11-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-AES256-SHA-client-openssl11-server-libressl.out  -l AES256-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-AES256-SHA-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-AES256-SHA-client-openssl11-server-libressl.out

==== check-cipher-AES256-SHA-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA-client-openssl11-server-libressl.out

==== run-cipher-AES256-SHA256-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-AES256-SHA256-client-openssl11-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-AES256-SHA256-client-openssl11-server-libressl.out  -l AES256-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-AES256-SHA256-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-AES256-SHA256-client-openssl11-server-libressl.out

==== check-cipher-AES256-SHA256-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA256-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA256-client-openssl11-server-libressl.out

==== run-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out  -l CAMELLIA128-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out

==== check-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out

==== run-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out  -l CAMELLIA128-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out

==== check-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out

==== run-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out  -l CAMELLIA256-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out

==== check-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out

==== run-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out  -l CAMELLIA256-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out

==== check-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out

==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out  -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out

==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out

==== run-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out  -l DHE-RSA-AES128-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out

==== check-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out

==== run-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out  -l DHE-RSA-AES128-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out

==== check-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out

==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out  -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out

==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out

==== run-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out  -l DHE-RSA-AES256-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out

==== check-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out

==== run-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out  -l DHE-RSA-AES256-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out

==== check-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out

==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out  -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out

==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out

==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out  -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out

==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out

==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out  -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out

==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out

==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out  -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out

==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out

==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CHACHA20-POLY1305   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out  -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out

==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out

==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out  -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out

==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out

==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out  -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out

==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out

==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out  -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out

==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out

==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out  -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out

==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out

==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out  -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out

==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out

==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out  -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out

==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out

==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-CHACHA20-POLY1305   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out  -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out

==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out

==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out  -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out

==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out

==== run-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out  -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out

==== check-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out

==== run-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out  -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out

==== check-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out

==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out  -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out

==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out

==== run-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out  -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out

==== check-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out

==== run-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out  -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out

==== check-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out

==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-CHACHA20-POLY1305   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out  -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out

==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out

==== run-cipher-AES128-GCM-SHA256-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-AES128-GCM-SHA256-client-openssl31-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-AES128-GCM-SHA256-client-openssl31-server-libressl.out  -l AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-openssl31-server-libressl.out

==== check-cipher-AES128-GCM-SHA256-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-GCM-SHA256-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-GCM-SHA256-client-openssl31-server-libressl.out

==== run-cipher-AES128-SHA-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-AES128-SHA-client-openssl31-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-AES128-SHA-client-openssl31-server-libressl.out  -l AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-AES128-SHA-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-AES128-SHA-client-openssl31-server-libressl.out

==== check-cipher-AES128-SHA-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA-client-openssl31-server-libressl.out

==== run-cipher-AES128-SHA256-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-AES128-SHA256-client-openssl31-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-AES128-SHA256-client-openssl31-server-libressl.out  -l AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-AES128-SHA256-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-AES128-SHA256-client-openssl31-server-libressl.out

==== check-cipher-AES128-SHA256-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA256-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA256-client-openssl31-server-libressl.out

==== run-cipher-AES256-GCM-SHA384-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-AES256-GCM-SHA384-client-openssl31-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-AES256-GCM-SHA384-client-openssl31-server-libressl.out  -l AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-openssl31-server-libressl.out

==== check-cipher-AES256-GCM-SHA384-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-GCM-SHA384-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-GCM-SHA384-client-openssl31-server-libressl.out

==== run-cipher-AES256-SHA-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-AES256-SHA-client-openssl31-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-AES256-SHA-client-openssl31-server-libressl.out  -l AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-AES256-SHA-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-AES256-SHA-client-openssl31-server-libressl.out

==== check-cipher-AES256-SHA-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA-client-openssl31-server-libressl.out

==== run-cipher-AES256-SHA256-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-AES256-SHA256-client-openssl31-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-AES256-SHA256-client-openssl31-server-libressl.out  -l AES256-SHA256  `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-AES256-SHA256-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-AES256-SHA256-client-openssl31-server-libressl.out

==== check-cipher-AES256-SHA256-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA256-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA256-client-openssl31-server-libressl.out

==== run-cipher-CAMELLIA128-SHA-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-CAMELLIA128-SHA-client-openssl31-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-CAMELLIA128-SHA-client-openssl31-server-libressl.out  -l CAMELLIA128-SHA  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-openssl31-server-libressl.out

==== check-cipher-CAMELLIA128-SHA-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA-client-openssl31-server-libressl.out

==== run-cipher-CAMELLIA128-SHA256-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-CAMELLIA128-SHA256-client-openssl31-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-CAMELLIA128-SHA256-client-openssl31-server-libressl.out  -l CAMELLIA128-SHA256  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-openssl31-server-libressl.out

==== check-cipher-CAMELLIA128-SHA256-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA256-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA256-client-openssl31-server-libressl.out

==== run-cipher-CAMELLIA256-SHA-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-CAMELLIA256-SHA-client-openssl31-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-CAMELLIA256-SHA-client-openssl31-server-libressl.out  -l CAMELLIA256-SHA  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-openssl31-server-libressl.out

==== check-cipher-CAMELLIA256-SHA-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA-client-openssl31-server-libressl.out

==== run-cipher-CAMELLIA256-SHA256-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-CAMELLIA256-SHA256-client-openssl31-server-libressl.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-CAMELLIA256-SHA256-client-openssl31-server-libressl.out  -l CAMELLIA256-SHA256  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-openssl31-server-libressl.out

==== check-cipher-CAMELLIA256-SHA256-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA256-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA256-client-openssl31-server-libressl.out

==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out  -l DHE-RSA-AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out

==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out

==== run-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-libressl.out  -l DHE-RSA-AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-libressl.out

==== check-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-libressl.out

==== run-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-libressl.out  -l DHE-RSA-AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-libressl.out

==== check-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-libressl.out

==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out  -l DHE-RSA-AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out

==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out

==== run-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-libressl.out  -l DHE-RSA-AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-libressl.out

==== check-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-libressl.out

==== run-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-libressl.out  -l DHE-RSA-AES256-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-libressl.out

==== check-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-libressl.out

==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-libressl.out  -l DHE-RSA-CAMELLIA128-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-libressl.out

==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-libressl.out

==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-libressl.out  -l DHE-RSA-CAMELLIA128-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-libressl.out

==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-libressl.out

==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-libressl.out  -l DHE-RSA-CAMELLIA256-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-libressl.out

==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-libressl.out

==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-libressl.out  -l DHE-RSA-CAMELLIA256-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-libressl.out

==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-libressl.out

==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CHACHA20-POLY1305   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out  -l DHE-RSA-CHACHA20-POLY1305  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out

==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out

==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out  -l ECDHE-ECDSA-AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out

==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out

==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-libressl.out  -l ECDHE-ECDSA-AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-libressl.out

==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-libressl.out

==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-libressl.out  -l ECDHE-ECDSA-AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-libressl.out

==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-libressl.out

==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out  -l ECDHE-ECDSA-AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out

==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out

==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-libressl.out  -l ECDHE-ECDSA-AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-libressl.out

==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-libressl.out

==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-libressl.out  -l ECDHE-ECDSA-AES256-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-libressl.out

==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-libressl.out

==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-CHACHA20-POLY1305   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out  -l ECDHE-ECDSA-CHACHA20-POLY1305  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out

==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out

==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out  -l ECDHE-RSA-AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out

==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-libressl.out

==== run-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-libressl.out  -l ECDHE-RSA-AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-libressl.out

==== check-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-libressl.out

==== run-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-libressl.out  -l ECDHE-RSA-AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-libressl.out

==== check-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-libressl.out

==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out  -l ECDHE-RSA-AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out

==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-libressl.out

==== run-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-libressl.out  -l ECDHE-RSA-AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-libressl.out

==== check-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-libressl.out

==== run-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-libressl.out  -l ECDHE-RSA-AES256-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-libressl.out

==== check-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-libressl.out

==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-libressl ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-CHACHA20-POLY1305   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out  -l ECDHE-RSA-CHACHA20-POLY1305  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out`
grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out

==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-libressl ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-libressl.out

==== run-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-GCM-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out  -l AES128-GCM-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out

==== check-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out

==== run-cipher-AES128-SHA-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-AES128-SHA-client-openssl11-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-AES128-SHA-client-openssl11-server-openssl11.out  -l AES128-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-AES128-SHA-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-AES128-SHA-client-openssl11-server-openssl11.out

==== check-cipher-AES128-SHA-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA-client-openssl11-server-openssl11.out

==== run-cipher-AES128-SHA256-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-AES128-SHA256-client-openssl11-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-AES128-SHA256-client-openssl11-server-openssl11.out  -l AES128-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-AES128-SHA256-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-AES128-SHA256-client-openssl11-server-openssl11.out

==== check-cipher-AES128-SHA256-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA256-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA256-client-openssl11-server-openssl11.out

==== run-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-GCM-SHA384,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out  -l AES256-GCM-SHA384,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out

==== check-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out

==== run-cipher-AES256-SHA-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-AES256-SHA-client-openssl11-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-AES256-SHA-client-openssl11-server-openssl11.out  -l AES256-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-AES256-SHA-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-AES256-SHA-client-openssl11-server-openssl11.out

==== check-cipher-AES256-SHA-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA-client-openssl11-server-openssl11.out

==== run-cipher-AES256-SHA256-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-AES256-SHA256-client-openssl11-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-AES256-SHA256-client-openssl11-server-openssl11.out  -l AES256-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-AES256-SHA256-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-AES256-SHA256-client-openssl11-server-openssl11.out

==== check-cipher-AES256-SHA256-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA256-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA256-client-openssl11-server-openssl11.out

==== run-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA128-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out  -l CAMELLIA128-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out

==== check-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out

==== run-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA128-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out  -l CAMELLIA128-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out

==== check-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out

==== run-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA256-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out  -l CAMELLIA256-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out

==== check-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out

==== run-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA256-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out  -l CAMELLIA256-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out

==== check-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out

==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out  -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out

==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out

==== run-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out  -l DHE-RSA-AES128-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out

==== check-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out

==== run-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out  -l DHE-RSA-AES128-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out

==== check-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out

==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out  -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out

==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out

==== run-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out  -l DHE-RSA-AES256-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out

==== check-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out

==== run-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out  -l DHE-RSA-AES256-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out

==== check-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out

==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out  -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out

==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out

==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out  -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out

==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out

==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out  -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out

==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out

==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out  -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out

==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out

==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out  -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out

==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out

==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out  -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out

==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out

==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out  -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out

==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out

==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out  -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out

==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out

==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out  -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out

==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out

==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out  -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out

==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out

==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out  -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out

==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out

==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out  -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out

==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out

==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out  -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out

==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out

==== run-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out  -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out

==== check-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out

==== run-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out  -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out

==== check-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out

==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out  -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out

==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out

==== run-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out  -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out

==== check-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out

==== run-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out  -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out

==== check-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out

==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out  -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out

==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out

==== run-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl31.out  -l AES128-GCM-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl31.out

==== check-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl31.out

==== run-cipher-AES128-SHA-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-AES128-SHA-client-openssl11-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-AES128-SHA-client-openssl11-server-openssl31.out  -l AES128-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-AES128-SHA-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-AES128-SHA-client-openssl11-server-openssl31.out

==== check-cipher-AES128-SHA-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA-client-openssl11-server-openssl31.out

==== run-cipher-AES128-SHA256-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-AES128-SHA256-client-openssl11-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-AES128-SHA256-client-openssl11-server-openssl31.out  -l AES128-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-AES128-SHA256-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-AES128-SHA256-client-openssl11-server-openssl31.out

==== check-cipher-AES128-SHA256-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA256-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA256-client-openssl11-server-openssl31.out

==== run-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl31.out  -l AES256-GCM-SHA384,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl31.out

==== check-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl31.out

==== run-cipher-AES256-SHA-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-AES256-SHA-client-openssl11-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-AES256-SHA-client-openssl11-server-openssl31.out  -l AES256-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-AES256-SHA-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-AES256-SHA-client-openssl11-server-openssl31.out

==== check-cipher-AES256-SHA-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA-client-openssl11-server-openssl31.out

==== run-cipher-AES256-SHA256-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-AES256-SHA256-client-openssl11-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-AES256-SHA256-client-openssl11-server-openssl31.out  -l AES256-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-AES256-SHA256-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-AES256-SHA256-client-openssl11-server-openssl31.out

==== check-cipher-AES256-SHA256-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA256-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA256-client-openssl11-server-openssl31.out

==== run-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl31.out  -l CAMELLIA128-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl31.out

==== check-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl31.out

==== run-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl31.out  -l CAMELLIA128-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl31.out

==== check-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl31.out

==== run-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl31.out  -l CAMELLIA256-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl31.out

==== check-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl31.out

==== run-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl31.out  -l CAMELLIA256-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl31.out

==== check-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl31.out

==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out  -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out

==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out

==== run-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl31.out  -l DHE-RSA-AES128-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl31.out

==== check-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl31.out

==== run-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl31.out  -l DHE-RSA-AES128-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl31.out

==== check-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl31.out

==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out  -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out

==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out

==== run-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl31.out  -l DHE-RSA-AES256-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl31.out

==== check-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl31.out

==== run-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl31.out  -l DHE-RSA-AES256-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl31.out

==== check-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl31.out

==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl31.out  -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl31.out

==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl31.out

==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl31.out  -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl31.out

==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl31.out

==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl31.out  -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl31.out

==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl31.out

==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl31.out  -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl31.out

==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl31.out

==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CHACHA20-POLY1305   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out  -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out

==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out

==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out  -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out

==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out

==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl31.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl31.out  -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl31.out

==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl31.out

==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl31.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl31.out  -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl31.out

==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl31.out

==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out  -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out

==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out

==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl31.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl31.out  -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl31.out

==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl31.out

==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl31.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl31.out  -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl31.out

==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl31.out

==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-CHACHA20-POLY1305   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out  -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out

==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out

==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out  -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out

==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl31.out

==== run-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl31.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl31.out  -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl31.out

==== check-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl31.out

==== run-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl31.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl31.out  -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl31.out

==== check-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl31.out

==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out  -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out

==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl31.out

==== run-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl31.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl31.out  -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl31.out

==== check-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl31.out

==== run-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl31.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl31.out  -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl31.out

==== check-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl31.out

==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-CHACHA20-POLY1305   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out  -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out

==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl31.out

==== run-cipher-AES128-GCM-SHA256-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-AES128-GCM-SHA256-client-openssl31-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-GCM-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-AES128-GCM-SHA256-client-openssl31-server-openssl11.out  -l AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-openssl31-server-openssl11.out

==== check-cipher-AES128-GCM-SHA256-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-GCM-SHA256-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-GCM-SHA256-client-openssl31-server-openssl11.out

==== run-cipher-AES128-SHA-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-AES128-SHA-client-openssl31-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-AES128-SHA-client-openssl31-server-openssl11.out  -l AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-AES128-SHA-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-AES128-SHA-client-openssl31-server-openssl11.out

==== check-cipher-AES128-SHA-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA-client-openssl31-server-openssl11.out

==== run-cipher-AES128-SHA256-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-AES128-SHA256-client-openssl31-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-AES128-SHA256-client-openssl31-server-openssl11.out  -l AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-AES128-SHA256-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-AES128-SHA256-client-openssl31-server-openssl11.out

==== check-cipher-AES128-SHA256-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA256-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA256-client-openssl31-server-openssl11.out

==== run-cipher-AES256-GCM-SHA384-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-AES256-GCM-SHA384-client-openssl31-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-GCM-SHA384,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-AES256-GCM-SHA384-client-openssl31-server-openssl11.out  -l AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-openssl31-server-openssl11.out

==== check-cipher-AES256-GCM-SHA384-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-GCM-SHA384-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-GCM-SHA384-client-openssl31-server-openssl11.out

==== run-cipher-AES256-SHA-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-AES256-SHA-client-openssl31-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-AES256-SHA-client-openssl31-server-openssl11.out  -l AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-AES256-SHA-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-AES256-SHA-client-openssl31-server-openssl11.out

==== check-cipher-AES256-SHA-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA-client-openssl31-server-openssl11.out

==== run-cipher-AES256-SHA256-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-AES256-SHA256-client-openssl31-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-AES256-SHA256-client-openssl31-server-openssl11.out  -l AES256-SHA256  `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-AES256-SHA256-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-AES256-SHA256-client-openssl31-server-openssl11.out

==== check-cipher-AES256-SHA256-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA256-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA256-client-openssl31-server-openssl11.out

==== run-cipher-CAMELLIA128-SHA-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-CAMELLIA128-SHA-client-openssl31-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA128-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-CAMELLIA128-SHA-client-openssl31-server-openssl11.out  -l CAMELLIA128-SHA  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-openssl31-server-openssl11.out

==== check-cipher-CAMELLIA128-SHA-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA-client-openssl31-server-openssl11.out

==== run-cipher-CAMELLIA128-SHA256-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-CAMELLIA128-SHA256-client-openssl31-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA128-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-CAMELLIA128-SHA256-client-openssl31-server-openssl11.out  -l CAMELLIA128-SHA256  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-openssl31-server-openssl11.out

==== check-cipher-CAMELLIA128-SHA256-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA256-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA256-client-openssl31-server-openssl11.out

==== run-cipher-CAMELLIA256-SHA-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-CAMELLIA256-SHA-client-openssl31-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA256-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-CAMELLIA256-SHA-client-openssl31-server-openssl11.out  -l CAMELLIA256-SHA  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-openssl31-server-openssl11.out

==== check-cipher-CAMELLIA256-SHA-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA-client-openssl31-server-openssl11.out

==== run-cipher-CAMELLIA256-SHA256-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-CAMELLIA256-SHA256-client-openssl31-server-openssl11.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA256-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-CAMELLIA256-SHA256-client-openssl31-server-openssl11.out  -l CAMELLIA256-SHA256  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-openssl31-server-openssl11.out

==== check-cipher-CAMELLIA256-SHA256-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA256-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA256-client-openssl31-server-openssl11.out

==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out  -l DHE-RSA-AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out

==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out

==== run-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-openssl11.out  -l DHE-RSA-AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-openssl11.out

==== check-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-openssl11.out

==== run-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-openssl11.out  -l DHE-RSA-AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-openssl11.out

==== check-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-openssl11.out

==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out  -l DHE-RSA-AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out

==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out

==== run-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-openssl11.out  -l DHE-RSA-AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-openssl11.out

==== check-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-openssl11.out

==== run-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-openssl11.out  -l DHE-RSA-AES256-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-openssl11.out

==== check-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-openssl11.out

==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-openssl11.out  -l DHE-RSA-CAMELLIA128-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-openssl11.out

==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-openssl11.out

==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-openssl11.out  -l DHE-RSA-CAMELLIA128-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-openssl11.out

==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-openssl11.out

==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-openssl11.out  -l DHE-RSA-CAMELLIA256-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-openssl11.out

==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-openssl11.out

==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-openssl11.out  -l DHE-RSA-CAMELLIA256-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-openssl11.out

==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-openssl11.out

==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out  -l DHE-RSA-CHACHA20-POLY1305  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out

==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out

==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out  -l ECDHE-ECDSA-AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out

==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out

==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-openssl11.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-openssl11.out  -l ECDHE-ECDSA-AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-openssl11.out

==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-openssl11.out

==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-openssl11.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-openssl11.out  -l ECDHE-ECDSA-AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-openssl11.out

==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-openssl11.out

==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out  -l ECDHE-ECDSA-AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out

==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out

==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-openssl11.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-openssl11.out  -l ECDHE-ECDSA-AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-openssl11.out

==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-openssl11.out

==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-openssl11.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-openssl11.out  -l ECDHE-ECDSA-AES256-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-openssl11.out

==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-openssl11.out

==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out  -l ECDHE-ECDSA-CHACHA20-POLY1305  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out

==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out

==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out  -l ECDHE-RSA-AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out

==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl11.out

==== run-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-openssl11.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-openssl11.out  -l ECDHE-RSA-AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-openssl11.out

==== check-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-openssl11.out

==== run-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-openssl11.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-openssl11.out  -l ECDHE-RSA-AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-openssl11.out

==== check-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-openssl11.out

==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out  -l ECDHE-RSA-AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out

==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl11.out

==== run-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-openssl11.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-openssl11.out  -l ECDHE-RSA-AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-openssl11.out

==== check-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-openssl11.out

==== run-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-openssl11.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-openssl11.out  -l ECDHE-RSA-AES256-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-openssl11.out

==== check-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-openssl11.out

==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl11 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out  -l ECDHE-RSA-CHACHA20-POLY1305  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out`
grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out

==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl11 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl11.out

==== run-cipher-AES128-GCM-SHA256-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-AES128-GCM-SHA256-client-openssl31-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-AES128-GCM-SHA256-client-openssl31-server-openssl31.out  -l AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-openssl31-server-openssl31.out

==== check-cipher-AES128-GCM-SHA256-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-GCM-SHA256-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-GCM-SHA256-client-openssl31-server-openssl31.out

==== run-cipher-AES128-SHA-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-AES128-SHA-client-openssl31-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-AES128-SHA-client-openssl31-server-openssl31.out  -l AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-AES128-SHA-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-AES128-SHA-client-openssl31-server-openssl31.out

==== check-cipher-AES128-SHA-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA-client-openssl31-server-openssl31.out

==== run-cipher-AES128-SHA256-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-AES128-SHA256-client-openssl31-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-AES128-SHA256-client-openssl31-server-openssl31.out  -l AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-AES128-SHA256-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-AES128-SHA256-client-openssl31-server-openssl31.out

==== check-cipher-AES128-SHA256-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA256-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA256-client-openssl31-server-openssl31.out

==== run-cipher-AES256-GCM-SHA384-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-AES256-GCM-SHA384-client-openssl31-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-AES256-GCM-SHA384-client-openssl31-server-openssl31.out  -l AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-openssl31-server-openssl31.out

==== check-cipher-AES256-GCM-SHA384-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-GCM-SHA384-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-GCM-SHA384-client-openssl31-server-openssl31.out

==== run-cipher-AES256-SHA-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-AES256-SHA-client-openssl31-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-AES256-SHA-client-openssl31-server-openssl31.out  -l AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-AES256-SHA-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-AES256-SHA-client-openssl31-server-openssl31.out

==== check-cipher-AES256-SHA-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA-client-openssl31-server-openssl31.out

==== run-cipher-AES256-SHA256-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-AES256-SHA256-client-openssl31-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l AES256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-AES256-SHA256-client-openssl31-server-openssl31.out  -l AES256-SHA256  `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-AES256-SHA256-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-AES256-SHA256-client-openssl31-server-openssl31.out

==== check-cipher-AES256-SHA256-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA256-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA256-client-openssl31-server-openssl31.out

==== run-cipher-CAMELLIA128-SHA-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-CAMELLIA128-SHA-client-openssl31-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-CAMELLIA128-SHA-client-openssl31-server-openssl31.out  -l CAMELLIA128-SHA  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-openssl31-server-openssl31.out

==== check-cipher-CAMELLIA128-SHA-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA-client-openssl31-server-openssl31.out

==== run-cipher-CAMELLIA128-SHA256-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-CAMELLIA128-SHA256-client-openssl31-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-CAMELLIA128-SHA256-client-openssl31-server-openssl31.out  -l CAMELLIA128-SHA256  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-openssl31-server-openssl31.out

==== check-cipher-CAMELLIA128-SHA256-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA256-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA256-client-openssl31-server-openssl31.out

==== run-cipher-CAMELLIA256-SHA-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-CAMELLIA256-SHA-client-openssl31-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-CAMELLIA256-SHA-client-openssl31-server-openssl31.out  -l CAMELLIA256-SHA  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-openssl31-server-openssl31.out

==== check-cipher-CAMELLIA256-SHA-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA-client-openssl31-server-openssl31.out

==== run-cipher-CAMELLIA256-SHA256-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-CAMELLIA256-SHA256-client-openssl31-server-openssl31.out  -c 127.0.0.1.crt -k 127.0.0.1.key  -l CAMELLIA256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-CAMELLIA256-SHA256-client-openssl31-server-openssl31.out  -l CAMELLIA256-SHA256  `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-openssl31-server-openssl31.out

==== check-cipher-CAMELLIA256-SHA256-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA256-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA256-client-openssl31-server-openssl31.out

==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out  -l DHE-RSA-AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out

==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out

==== run-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-openssl31.out  -l DHE-RSA-AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-openssl31.out

==== check-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA-client-openssl31-server-openssl31.out

==== run-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-openssl31.out  -l DHE-RSA-AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-openssl31.out

==== check-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl31-server-openssl31.out

==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out  -l DHE-RSA-AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out

==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out

==== run-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-openssl31.out  -l DHE-RSA-AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-openssl31.out

==== check-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA-client-openssl31-server-openssl31.out

==== run-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-AES256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-openssl31.out  -l DHE-RSA-AES256-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-openssl31.out

==== check-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl31-server-openssl31.out

==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-openssl31.out  -l DHE-RSA-CAMELLIA128-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-openssl31.out

==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl31-server-openssl31.out

==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-openssl31.out  -l DHE-RSA-CAMELLIA128-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-openssl31.out

==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl31-server-openssl31.out

==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-openssl31.out  -l DHE-RSA-CAMELLIA256-SHA  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-openssl31.out

==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl31-server-openssl31.out

==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CAMELLIA256-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-openssl31.out  -l DHE-RSA-CAMELLIA256-SHA256  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-openssl31.out

==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl31-server-openssl31.out

==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out  -c rsa.crt -k rsa.key  -l DHE-RSA-CHACHA20-POLY1305   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out  -l DHE-RSA-CHACHA20-POLY1305  `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out

==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out

==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out  -l ECDHE-ECDSA-AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out

==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out

==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-openssl31.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-openssl31.out  -l ECDHE-ECDSA-AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-openssl31.out

==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl31-server-openssl31.out

==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-openssl31.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-openssl31.out  -l ECDHE-ECDSA-AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-openssl31.out

==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl31-server-openssl31.out

==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out  -l ECDHE-ECDSA-AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out

==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out

==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-openssl31.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-openssl31.out  -l ECDHE-ECDSA-AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-openssl31.out

==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl31-server-openssl31.out

==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-openssl31.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-AES256-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-openssl31.out  -l ECDHE-ECDSA-AES256-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-openssl31.out

==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl31-server-openssl31.out

==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out  -c ec.crt -k ec.key  -l ECDHE-ECDSA-CHACHA20-POLY1305   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out  -l ECDHE-ECDSA-CHACHA20-POLY1305  `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out

==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out

==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-GCM-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out  -l ECDHE-RSA-AES128-GCM-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out

==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl31-server-openssl31.out

==== run-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-openssl31.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-openssl31.out  -l ECDHE-RSA-AES128-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-openssl31.out

==== check-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl31-server-openssl31.out

==== run-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-openssl31.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES128-SHA256   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-openssl31.out  -l ECDHE-RSA-AES128-SHA256  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-openssl31.out

==== check-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl31-server-openssl31.out

==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-GCM-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out  -l ECDHE-RSA-AES256-GCM-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out

==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl31-server-openssl31.out

==== run-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-openssl31.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-SHA   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-openssl31.out  -l ECDHE-RSA-AES256-SHA  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-openssl31.out

==== check-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl31-server-openssl31.out

==== run-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-openssl31.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-AES256-SHA384   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-openssl31.out  -l ECDHE-RSA-AES256-SHA384  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-openssl31.out

==== check-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl31-server-openssl31.out

==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl31 ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out  -c rsa.crt -k rsa.key  -l ECDHE-RSA-CHACHA20-POLY1305   127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out  -l ECDHE-RSA-CHACHA20-POLY1305  `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out`
grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out ||  { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out; }
grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out

==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl31 ====
# client and server 1.3 capable, not TLS 1.3 cipher
# openssl 1.1 generic client cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out
# generic server cipher
grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl31-server-openssl31.out

===> cert
==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify ====
openssl req -batch -new  -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/  -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt
Generating a 2048 bit RSA private key
..........................................
.........................................................................................................................
writing new private key to '127.0.0.1.key'
-----
openssl req -batch -new  -subj /L=OpenBSD/O=tls-regress/OU=ca/CN=root/  -nodes -newkey rsa -keyout ca.key -x509 -out ca.crt
Generating a 2048 bit RSA private key
.....
....................................................................................................................................
writing new private key to 'ca.key'
-----
openssl req -batch -new  -subj /L=OpenBSD/O=tls-regress/OU=ca/CN=root/  -nodes -newkey rsa -keyout fake-ca.key -x509 -out fake-ca.crt
Generating a 2048 bit RSA private key
....................................................................................................................
.......
writing new private key to 'fake-ca.key'
-----
openssl req -batch -new  -subj /L=OpenBSD/O=tls-regress/OU=client/CN=localhost/  -nodes -newkey rsa -keyout client.key -out client.req
Generating a 2048 bit RSA private key
....................
.............
writing new private key to 'client.key'
-----
openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt  -req -in client.req -out client.crt
Signature ok
subject=/L=OpenBSD/O=tls-regress/OU=client/CN=localhost
openssl req -batch -new  -subj /L=OpenBSD/O=tls-regress/OU=server/CN=localhost/  -nodes -newkey rsa -keyout server.key -out server.req
Generating a 2048 bit RSA private key
.................
...........................................................................................................................
writing new private key to 'server.key'
-----
openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt  -req -in server.req -out server.crt
Signature ok
subject=/L=OpenBSD/O=tls-regress/OU=server/CN=localhost
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-nocert-noverify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-nocert-verify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-nocert-verify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out`
102819354512:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
154115217296:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
284061685648:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
214377486224:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out`
137548896144:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out`
81157887888:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out`
99025016720:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out
client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out`
105339197328:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-nocert-noverify.out`
64832853904:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-nocert-noverify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out
client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-nocert-noverify.out
client-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out`
117961185168:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out
client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out`
267460892560:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-nocert-verify.out`
33805866896:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-nocert-verify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out
client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-nocert-verify.out
client-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out`
44265412496:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out
client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out`
88311273360:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-nocert-certverify.out`
125893760912:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-nocert-certverify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out
client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-nocert-certverify.out
client-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-cert-verify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-cert-verify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-cert-verify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-certverify.out`
245921273744:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
193491572624:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
22135789456:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
111478429584:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-certverify.out`
34846398352:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-noca-cert-certverify.out`
210621175696:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out`
212251400080:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out
client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out`
145320499088:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-cert-noverify.out`
207354451856:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-cert-noverify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out
client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-cert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-cert-noverify.out
client-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out`
118051919760:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out
client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out`
279283341200:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-cert-verify.out`
60002195344:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-cert-verify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out
client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-cert-verify.out
client-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-certverify.out`
121354344336:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1

==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-certverify.out`
192777230224:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1

==== run-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl31-noca-cert-certverify.out`
255397697424:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
SSL_connect -1
server: SSL_accept -1

==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1

==== run-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-libressl-noca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1

==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-noverify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-noverify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out`
58833033104:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out
client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out
client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-verify.out
client-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-verify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out`
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
50474751888:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
client: SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out
client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-verify.out`
223137617808:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -100000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48

client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-verify.out
client-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out`
64842454928:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out
client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out
client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-certverify.out
client-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-certverify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out`
274854582160:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out
client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-certverify.out`
150806091664:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -100000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48

client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-certverify.out
client-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out`
261439788944:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out
client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out`
95361292176:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-verify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl31-noca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl31-noca-nocert-noverify.out`
290553878416:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl31-noca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl31-noca-nocert-noverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl31-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out
client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-verify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-libressl-noca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-libressl-noca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl31-noca-cert-verify-server-libressl-noca-nocert-noverify.out
client-cert-client-openssl31-noca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out`
25754834832:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out
client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out`
112549091216:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out
client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-verify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl31-noca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl31-noca-nocert-verify.out`
179746183056:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl31-noca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl31-noca-nocert-verify.out
client-cert-client-libressl-noca-cert-verify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out
client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-verify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-libressl-noca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-libressl-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl31-noca-cert-verify-server-libressl-noca-nocert-verify.out
client-cert-client-openssl31-noca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out`
40452822928:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out
client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out`
267263956880:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-verify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl31-noca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl31-noca-nocert-certverify.out`
53016745872:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl31-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl31-noca-nocert-certverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out
client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-verify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-libressl-noca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-libressl-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl31-noca-cert-verify-server-libressl-noca-nocert-certverify.out
client-cert-client-openssl31-noca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out`
57090742160:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out
client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out
client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-verify.out
client-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-verify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out`
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
32640522128:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
client: SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out
client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-verify.out`
23127021456:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-verify.out
client-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out`
45170415504:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out
client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out
client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-certverify.out
client-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-certverify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-openssl31-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out`
31663904656:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out
client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-certverify.out`
69124904848:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-certverify.out
client-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out`
160566728592:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out
client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out`
19313792912:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-verify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl31-noca-cert-noverify.out`
62386411408:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl31-noca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl31-noca-cert-noverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl31-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out
client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-verify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-libressl-noca-cert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl31-noca-cert-verify-server-libressl-noca-cert-noverify.out
client-cert-client-openssl31-noca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out`
24362080144:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out
client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out`
47258277776:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out
client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-verify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl31-noca-cert-verify.out`
162132613008:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl31-noca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl31-noca-cert-verify.out
client-cert-client-libressl-noca-cert-verify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out
client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-verify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-libressl-noca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl31-noca-cert-verify-server-libressl-noca-cert-verify.out
client-cert-client-openssl31-noca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out`
77303732112:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out
client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out`
37216851856:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-verify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl31-noca-cert-certverify.out`
36348729232:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl31-noca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl31-noca-cert-certverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl31-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out
client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-verify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-libressl-noca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl31-noca-cert-verify-server-libressl-noca-cert-certverify.out
client-cert-client-openssl31-noca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-nocert-noverify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-nocert-verify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-nocert-verify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out`
217253336976:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
210580264848:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
254428288912:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
157945026448:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out`
26101159824:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out`
40811059088:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out`
64912447376:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out
client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out`
195697448848:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-nocert-noverify.out`
282522130320:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-nocert-noverify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out
client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-nocert-noverify.out
client-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out`
126420391824:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out
client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out`
42145666960:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-nocert-verify.out`
145230387088:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-nocert-verify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out
client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-nocert-verify.out
client-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out`
59892176784:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out
client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out`
212651988880:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-nocert-certverify.out`
252459046800:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-nocert-certverify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out
client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-nocert-certverify.out
client-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-certverify.out`
262093756304:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
190376843152:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
69077604240:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-ca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
209248114576:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-certverify.out`
264275826576:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-ca-cert-certverify.out`
161129224080:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out`
88897279888:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out
client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out`
291431274384:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-cert-noverify.out`
49082652560:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-cert-noverify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out
client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-cert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-cert-noverify.out
client-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out`
166670505872:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out
client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out`
176866776976:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-cert-verify.out`
268318676880:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-cert-verify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out
client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-cert-verify.out
client-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-certverify.out`
203168716688:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1

==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-certverify.out`
204695803792:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1

==== run-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl31-ca-cert-certverify.out`
274504062864:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1

==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1

==== run-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-libressl-ca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1

==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-nocert-noverify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-nocert-noverify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-nocert-verify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-nocert-verify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-nocert-certverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-nocert-certverify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-nocert-certverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-nocert-certverify.out
success

==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out`
190452782992:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out
client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out`
48068663184:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl31-ca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl31-ca-nocert-noverify.out`
108726163344:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl31-ca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl31-ca-nocert-noverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl31-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out
client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-libressl-ca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-libressl-ca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl31-noca-cert-verify-server-libressl-ca-nocert-noverify.out
client-cert-client-openssl31-noca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out`
265695467408:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out
client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out`
117554911120:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out
client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl31-ca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl31-ca-nocert-verify.out`
293724805008:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl31-ca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl31-ca-nocert-verify.out
client-cert-client-libressl-noca-cert-verify-server-openssl31-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out
client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-libressl-ca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-libressl-ca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl31-noca-cert-verify-server-libressl-ca-nocert-verify.out
client-cert-client-openssl31-noca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out`
198576281488:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out
client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out`
109166073744:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl31-ca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl31-ca-nocert-certverify.out`
110827378576:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl31-ca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl31-ca-nocert-certverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl31-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out
client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-libressl-ca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-libressl-ca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl31-noca-cert-verify-server-libressl-ca-nocert-certverify.out
client-cert-client-openssl31-noca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-cert-certverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl31-ca-cert-certverify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-libressl-ca-cert-certverify.out
success

==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out`
112739669904:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out
client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out`
277312231312:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl31-ca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl31-ca-cert-noverify.out`
281245063056:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl31-ca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl31-ca-cert-noverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl31-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out
client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-libressl-ca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-libressl-ca-cert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl31-noca-cert-verify-server-libressl-ca-cert-noverify.out
client-cert-client-openssl31-noca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out`
84688934800:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out
client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out`
196934440848:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out
client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl31-ca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl31-ca-cert-verify.out`
18734831504:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl31-ca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl31-ca-cert-verify.out
client-cert-client-libressl-noca-cert-verify-server-openssl31-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out
client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-verify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-libressl-ca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-libressl-ca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl31-noca-cert-verify-server-libressl-ca-cert-verify.out
client-cert-client-openssl31-noca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out`
153477420944:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out
client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out`
232085231504:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl31-ca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl31-ca-cert-certverify.out`
260441167760:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl31-ca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl31-ca-cert-certverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl31-ca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out
client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-libressl-ca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-libressl-ca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-libressl-ca-cert-certverify.out server-cert-client-openssl31-noca-cert-verify-server-libressl-ca-cert-certverify.out
client-cert-client-openssl31-noca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out`
204181886864:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
90999674768:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
215845623696:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
150660847504:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out`
285655996304:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out`
144910014352:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out`
161292523408:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out
client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out`
157474281360:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out`
135697717136:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out
client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out
client-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out`
48218822544:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out
client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out`
150831798160:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-nocert-verify.out`
176884504464:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out
client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out
client-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out`
41102137232:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out`
51966990224:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out`
274777446288:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-cert-verify.out`
grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-cert-verify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out
success

==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out`
223213115280:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
164284422032:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
80102692752:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
172533094288:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out`
55852734352:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out`
137745733520:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out`
246186203024:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
246186203024:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
246186203024:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
246186203024:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out
client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out`
219183536016:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
219183536016:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
219183536016:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
219183536016:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-cert-noverify.out`
154541676432:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
154541676432:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
154541676432:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
154541676432:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-cert-noverify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out
client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out
client-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out`
144311736208:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
144311736208:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
144311736208:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
144311736208:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out
client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out`
227657389968:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
227657389968:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
227657389968:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
227657389968:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-cert-verify.out`
254241511312:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
254241511312:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
254241511312:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
254241511312:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-cert-verify.out
client-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out
client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-cert-verify.out
client-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out`
139619719056:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
139619719056:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
139619719056:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
139619719056:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1

==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out`
129034262416:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
129034262416:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
129034262416:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
129034262416:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
client: SSL_connect -1
server: SSL_accept -1

==== run-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl31-fakeca-cert-certverify.out`
240371193744:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
240371193744:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
240371193744:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
240371193744:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1

==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1

==== run-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1

==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out`
162654001040:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
162654001040:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
162654001040:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
162654001040:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out
client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-verify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out`
188943226768:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
188943226768:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
188943226768:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
188943226768:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out
client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out`
253336983440:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
253336983440:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
253336983440:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
253336983440:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out
client-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out`
245180438416:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
245180438416:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
245180438416:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
245180438416:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out`
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
170285373328:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
170285373328:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
client: SSL_read 0
170285373328:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
170285373328:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out`
264389138320:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
264389138320:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
264389138320:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
264389138320:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out`
78904399760:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out
client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out`
37236823952:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-nocert-noverify.out`
203999827856:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-nocert-noverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out
client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out
client-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out`
134550001552:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out
client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out`
164367013776:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-nocert-verify.out`
266385643408:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out
client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-nocert-verify.out
client-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out`
153415980944:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out`
89542776720:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-nocert-certverify.out`
160110696336:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out`
163416774544:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
163416774544:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
163416774544:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
163416774544:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out
client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out
client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out
client-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out`
75741157264:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
75741157264:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
75741157264:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
75741157264:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out
client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-verify.out`
144550107024:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
144550107024:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
144550107024:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
144550107024:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-verify.out
client-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out`
237353736080:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
237353736080:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
237353736080:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
237353736080:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out
client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out
client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out
client-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out:verify: fail
server-cert-client-libressl-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out`
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
63634462608:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
client: SSL_read 0
63634462608:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
63634462608:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
63634462608:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out
client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out`
247178041232:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
247178041232:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
247178041232:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
247178041232:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out
client-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out`
105173014416:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
105173014416:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
105173014416:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
105173014416:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out
client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out`
229513172880:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
229513172880:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
229513172880:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
229513172880:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-noverify.out`
163499267984:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
163499267984:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
163499267984:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
163499267984:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-noverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out
client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-cert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-cert-noverify.out
client-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out`
235341813648:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
235341813648:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
235341813648:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
235341813648:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out
client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out`
110774343568:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
110774343568:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
110774343568:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
110774343568:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out
client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-verify.out`
29027620752:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
29027620752:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
29027620752:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
29027620752:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-verify.out
client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out
client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-cert-verify.out
client-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out`
42214201232:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
42214201232:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
42214201232:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
42214201232:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out
client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out`
126092629904:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
126092629904:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
126092629904:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
126092629904:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-certverify.out`
292544239504:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
292544239504:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
292544239504:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
292544239504:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-certverify.out
client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-noca-cert-verify-server-openssl31-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out
client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-cert-certverify.out
client-cert-client-openssl31-noca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-nocert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-nocert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-nocert-verify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out`
135857297296:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
157718402960:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
69620127632:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
96021927824:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out`
83275978640:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out`
198379837328:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out`
70345119632:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out
client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out`
238824740752:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out
client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-nocert-noverify.out`
218331715472:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-nocert-noverify.out
client-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out
client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-nocert-noverify.out
client-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out`
39368136592:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out
client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out`
183589394320:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out
client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-nocert-verify.out`
287584540560:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-nocert-verify.out
client-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out
client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-nocert-verify.out
client-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out`
205830641552:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out
client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out`
175614826384:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out
client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-nocert-certverify.out`
147792189328:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-nocert-certverify.out
client-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out
client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-nocert-certverify.out
client-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-cert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-cert-verify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-certverify.out`
229032548240:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
278720075664:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
153699964816:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
242551789456:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-certverify.out`
231590958992:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-noca-cert-certverify.out`
281499015056:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out
success

==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out
success

==== run-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-cert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-cert-verify.out
success

==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-certverify.out`
272894810000:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
195060651920:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
192152000400:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
268822370192:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-certverify.out`
179475453840:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-libressl-noca-cert-certverify.out`
170613643152:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-noverify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out`
172986881936:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out
client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out
client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-verify.out
client-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-verify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out`
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
120450504592:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out
client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-verify.out`
100163491728:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-verify.out
client-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out`
105008764816:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out
client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out
client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-certverify.out
client-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-certverify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out`
141993695120:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out
client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-certverify.out`
199077795728:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-certverify.out
client-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out`
165126789008:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out
client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out`
109728864144:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out
client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-verify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl31-noca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl31-noca-nocert-noverify.out`
160150132624:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl31-noca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-openssl31-noca-nocert-noverify.out
client-cert-client-libressl-ca-cert-verify-server-openssl31-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out
client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-verify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-libressl-noca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-libressl-noca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl31-ca-cert-verify-server-libressl-noca-nocert-noverify.out
client-cert-client-openssl31-ca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out`
256797562768:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out
client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out`
142297044880:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out
client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-verify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl31-noca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl31-noca-nocert-verify.out`
269955504016:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl31-noca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl31-noca-nocert-verify.out
client-cert-client-libressl-ca-cert-verify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out
client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-verify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-libressl-noca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-libressl-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl31-ca-cert-verify-server-libressl-noca-nocert-verify.out
client-cert-client-openssl31-ca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out`
89646438288:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out
client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out`
202473707408:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out
client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-verify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl31-noca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl31-noca-nocert-certverify.out`
132205352848:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl31-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl31-noca-nocert-certverify.out
client-cert-client-libressl-ca-cert-verify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out
client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-verify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-libressl-noca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-libressl-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl31-ca-cert-verify-server-libressl-noca-nocert-certverify.out
client-cert-client-openssl31-ca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out`
98489915280:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out
server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out
server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-cert-verify.out
server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out`
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
286679078800:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
client: SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out
server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-cert-verify.out`
159335438224:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-cert-verify.out
server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out`
265086490512:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out
server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out
server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-cert-certverify.out
server-cert-client-libressl-ca-cert-noverify-server-openssl31-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out`
194292897680:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out
server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-cert-certverify.out`
215458371472:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-cert-certverify.out
server-cert-client-openssl31-ca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-libressl-ca-cert-verify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-verify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl31-noca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-verify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-verify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-libressl-noca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-verify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out`
151288207248:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out
server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out
server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-verify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl31-noca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl31-noca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl31-noca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl31-noca-cert-verify.out
server-cert-client-libressl-ca-cert-verify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out`
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
186040407952:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
client: SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out
server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-verify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-libressl-noca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-libressl-noca-cert-verify.out`
51411670928:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl31-ca-cert-verify-server-libressl-noca-cert-verify.out
server-cert-client-openssl31-ca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out`
183028766608:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out
server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out
server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-verify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl31-noca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl31-noca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl31-noca-cert-certverify.out
server-cert-client-libressl-ca-cert-verify-server-openssl31-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out`
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
185767843728:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
client: SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out
server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-verify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-libressl-noca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-libressl-noca-cert-certverify.out`
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
243136075664:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl31-ca-cert-verify-server-libressl-noca-cert-certverify.out
server-cert-client-openssl31-ca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-nocert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-nocert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-nocert-verify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out`
23702034320:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
19072669584:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
88908896144:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
284214204304:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out`
143673497488:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out`
179800545168:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out`
265369917328:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out
client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out`
24511584144:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out
client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-nocert-noverify.out`
237049812880:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-nocert-noverify.out
client-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out
client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-nocert-noverify.out
client-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out`
73023920016:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out
client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out`
259798570896:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out
client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-nocert-verify.out`
169295091600:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-nocert-verify.out
client-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out
client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-nocert-verify.out
client-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out`
111724959632:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out
client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out`
32696063888:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out
client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-nocert-certverify.out`
250523113360:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-nocert-certverify.out
client-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out
client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-nocert-certverify.out
client-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-certverify.out`
122161469328:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
83230726032:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
78472812432:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-ca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
183656355728:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-certverify.out`
266788804496:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-ca-cert-certverify.out`
120588605328:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-certverify.out`
113158952848:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
39218435984:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
161004410768:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl31-ca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
77595203472:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-certverify.out`
181260294032:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-libressl-ca-cert-certverify.out`
123284821904:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-noverify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-nocert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-nocert-noverify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-verify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-verify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-nocert-verify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-verify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-nocert-verify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-certverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-certverify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-nocert-certverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-nocert-certverify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-certverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-certverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-nocert-certverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-nocert-certverify.out
success

==== run-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-noverify.out`
259698071440:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-noverify.out
client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-noverify.out`
38587127696:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-noverify.out
client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl31-ca-nocert-noverify.out`
70466983824:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl31-ca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-openssl31-ca-nocert-noverify.out
client-cert-client-libressl-ca-cert-verify-server-openssl31-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-noverify.out
client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-libressl-ca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl31-ca-cert-verify-server-libressl-ca-nocert-noverify.out
client-cert-client-openssl31-ca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-verify.out`
143004800912:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-verify.out
client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-verify.out`
293819979664:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-verify.out
client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl31-ca-nocert-verify.out`
122820515728:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl31-ca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl31-ca-nocert-verify.out
client-cert-client-libressl-ca-cert-verify-server-openssl31-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-verify.out
client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-libressl-ca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl31-ca-cert-verify-server-libressl-ca-nocert-verify.out
client-cert-client-openssl31-ca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-certverify.out`
52263344016:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-certverify.out
client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-certverify.out`
220547585936:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-certverify.out
client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl31-ca-nocert-certverify.out`
41642121104:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl31-ca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl31-ca-nocert-certverify.out
client-cert-client-libressl-ca-cert-verify-server-openssl31-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-certverify.out
client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-libressl-ca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl31-ca-cert-verify-server-libressl-ca-nocert-certverify.out
client-cert-client-openssl31-ca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-certverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-certverify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-certverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-certverify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-cert-certverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl31-ca-cert-certverify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-certverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-libressl-ca-cert-certverify.out
success

==== run-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-libressl-ca-cert-verify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-verify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-verify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-libressl-ca-cert-verify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-openssl31-ca-cert-verify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-verify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-verify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-certverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-certverify.out
success

==== run-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-certverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-certverify.out
success

==== run-cert-client-libressl-ca-cert-verify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl31-ca-cert-certverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl31-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl31-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl31-ca-cert-certverify.out
success

==== run-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-certverify.out
success

==== run-cert-client-openssl31-ca-cert-verify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-libressl-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-libressl-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-libressl-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-verify-server-libressl-ca-cert-certverify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out`
189105919888:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
123531548560:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
169727022992:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
251193825168:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out`
248892905360:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out`
39454365584:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out`
254691366800:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out
client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out`
215067891600:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out
client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out`
174259099536:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out
client-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out
client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out
client-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out`
241149417360:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out
client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out`
204561192848:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-nocert-verify.out`
234640791440:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out
client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out
client-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out`
149792216976:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out`
50138961808:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out`
141497292688:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-cert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out
success

==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out`
228307638160:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
234637776784:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
215819474832:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
21648234384:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out`
110869518224:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out`
258701711248:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-verify.out
success

==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out
success

==== run-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-cert-verify.out`
grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-cert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-cert-verify.out
success

==== run-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out`
79117342608:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
234002241424:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
282655119248:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
290180618128:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out`
248807872400:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out`
170813052816:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out`
245603129232:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
245603129232:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
245603129232:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
245603129232:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out
client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-verify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out`
200292767632:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
200292767632:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
200292767632:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
200292767632:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
200292767632:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
200292767632:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
200292767632:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out
client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out`
109619615632:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
109619615632:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
109619615632:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
109619615632:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
109619615632:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
client: SSL_read 0
109619615632:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
109619615632:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out
client-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out`
258455820176:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
258455820176:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
258455820176:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
258455820176:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out`
162714392464:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
162714392464:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
162714392464:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
162714392464:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
162714392464:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
162714392464:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
client: 162714392464:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out`
57318463376:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
57318463376:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
57318463376:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
57318463376:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
57318463376:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
57318463376:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
57318463376:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
client: SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out`
265594230672:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out
client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out`
91900041104:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out
client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-nocert-noverify.out`
236867737488:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-nocert-noverify.out
client-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out
client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out
client-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-verify.out`
255421683600:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-verify.out
client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out`
134078928784:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-nocert-verify.out`
98421905296:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-verify.out
client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-nocert-verify.out
client-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out`
190763046800:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out`
165021783952:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-nocert-certverify.out`
151240038288:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out`
25198483344:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
25198483344:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
25198483344:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
25198483344:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out
client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out
client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-verify.out
client-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-verify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out`
57885054864:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
57885054864:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
57885054864:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
57885054864:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
57885054864:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
57885054864:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
57885054864:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
client: SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out
server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-verify.out`
265638074256:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
265638074256:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
265638074256:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
265638074256:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
265638074256:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
265638074256:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
265638074256:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-verify.out
server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out`
61646788496:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
61646788496:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
61646788496:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
61646788496:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out
client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out
client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-certverify.out
client-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-certverify.out:verify: fail
server-cert-client-libressl-ca-cert-noverify-server-openssl31-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out`
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
196218754960:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
196218754960:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
196218754960:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
196218754960:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
client: SSL_read 0
196218754960:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
196218754960:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
196218754960:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out
server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out`
236304930704:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
236304930704:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
236304930704:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
236304930704:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
236304930704:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
client: SSL_read 0
236304930704:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
236304930704:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out
server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out`
260704999312:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
260704999312:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
260704999312:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
260704999312:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out
client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify.out
client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail
server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-verify.out
client-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail
server-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out`
118514964368:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
118514964368:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
118514964368:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
118514964368:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
118514964368:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
118514964368:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
118514964368:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
client: SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out
server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-verify.out`
147427448720:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
147427448720:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
147427448720:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
147427448720:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
147427448720:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
147427448720:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
147427448720:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-verify.out
server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out`
224361551760:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
224361551760:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
224361551760:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
224361551760:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out
client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out
client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail
server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-certverify.out
client-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-certverify.out:verify: fail
server-cert-client-libressl-ca-cert-verify-server-openssl31-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out`
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
199863031696:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
199863031696:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
199863031696:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
199863031696:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
client: SSL_read 0
199863031696:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
199863031696:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
199863031696:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out
server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-certverify.out`
149507692432:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
149507692432:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
149507692432:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
149507692432:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
149507692432:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
149507692432:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
client: 149507692432:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-certverify.out
server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl31-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-nocert-noverify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-nocert-verify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out`
21722568592:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
46970967952:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
170490648464:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
109269915536:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out`
260380989328:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out`
92437485456:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out`
252944193424:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out`
281676470160:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-nocert-noverify.out`
47156926352:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-nocert-noverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out`
243960207248:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out`
105731823504:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-nocert-verify.out`
245896271760:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-nocert-verify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out`
62168635280:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out`
215601878928:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-nocert-certverify.out`
163273562000:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-nocert-certverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-cert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-cert-verify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out`
35544356752:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
227717666704:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
214743242640:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
26114971536:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out`
283592103824:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out`
223603513232:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out`
202753808272:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
202753808272:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
202753808272:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
202753808272:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out`
125631125392:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
125631125392:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
125631125392:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
125631125392:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-cert-noverify.out`
78068373392:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
78068373392:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
78068373392:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
78068373392:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-cert-noverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out`
31825041296:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
31825041296:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
31825041296:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
31825041296:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out`
293588408208:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
293588408208:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
293588408208:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
293588408208:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-cert-verify.out`
193422432144:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
193422432144:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
193422432144:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
193422432144:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-cert-verify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-verify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-cert-verify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out`
41969178512:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
41969178512:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
41969178512:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
41969178512:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out`
123433113488:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
123433113488:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
123433113488:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
123433113488:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
server: SSL_accept -1
client: SSL_connect -1

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-noca-cert-certverify.out`
169264666512:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
169264666512:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
169264666512:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
169264666512:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1

==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1

==== run-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1

==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-noverify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out`
171340437392:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out
client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out
client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-verify.out
client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-verify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out`
44558014352:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
44558014352:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
44558014352:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
44558014352:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
client: SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out`
79861602192:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
79861602192:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
79861602192:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
79861602192:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
client: SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out`
104470910864:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out
client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out
client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify.out
client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out`
102641473424:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
102641473424:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
102641473424:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
102641473424:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out`
156990904208:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
156990904208:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
156990904208:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
156990904208:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out`
113192785808:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out
client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out`
96084809616:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-nocert-noverify.out`
240625457040:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-nocert-noverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-verify.out`
154533500816:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-verify.out
client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out`
215008810896:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-nocert-verify.out`
27673302928:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-nocert-verify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-verify.out
client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-nocert-verify.out
client-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out`
49920432016:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out
client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out`
40698828688:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-nocert-certverify.out`
73555793808:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-nocert-certverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out`
195527939984:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out
client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out
client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out
client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out`
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
174368806800:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
174368806800:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
174368806800:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
174368806800:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
client: SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-verify.out`
266953643920:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
266953643920:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
266953643920:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
266953643920:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-verify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out`
218149803920:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out
client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out
client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out
client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out`
193774213008:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
193774213008:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
193774213008:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
193774213008:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
client: SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out`
210377398160:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
210377398160:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
210377398160:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
210377398160:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
client: SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out`
142571067280:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
142571067280:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
142571067280:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
142571067280:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out
client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out`
25766565776:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
25766565776:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
25766565776:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
25766565776:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
server: SSL_accept -1
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-noverify.out`
119068727184:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
119068727184:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
119068727184:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
119068727184:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-noverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-noverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-noverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-cert-noverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-cert-noverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out`
194677200784:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
194677200784:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
194677200784:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
194677200784:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out
client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out`
95189964688:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
95189964688:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
95189964688:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
95189964688:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-verify.out`
65901909904:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
65901909904:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
65901909904:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
65901909904:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-verify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-verify.out
client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-cert-verify.out
client-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out`
26274387856:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
26274387856:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
26274387856:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
26274387856:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out
client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out`
262553393040:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
262553393040:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
262553393040:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
262553393040:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-certverify.out`
165358524304:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
165358524304:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
165358524304:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
165358524304:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-certverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-certverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-cert-certverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-nocert-noverify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-nocert-verify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out`
95938500496:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
290272810896:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
190413133712:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
268443752336:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out`
120165439376:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out`
244607801232:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out`
146919217040:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out`
20390778768:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-nocert-noverify.out`
255935600528:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-nocert-noverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out`
144365361040:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out`
232509200272:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-nocert-verify.out`
118777337744:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-nocert-verify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out`
124463388560:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out`
52993300368:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-nocert-certverify.out`
167664129936:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-nocert-certverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out`
144383006608:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
115862394768:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
237728864144:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-ca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
175696091024:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out`
166224287632:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out`
146920085392:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out`
182972520336:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
182972520336:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
182972520336:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
182972520336:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
182972520336:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
182972520336:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
182972520336:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out`
56478291856:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
56478291856:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
56478291856:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
56478291856:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
56478291856:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
56478291856:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
56478291856:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-noverify.out`
179818633104:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
179818633104:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
179818633104:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
179818633104:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
179818633104:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
179818633104:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
179818633104:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-noverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out`
77113989008:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
77113989008:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
77113989008:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
77113989008:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
77113989008:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
77113989008:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
77113989008:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out`
44654188432:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
44654188432:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
44654188432:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
44654188432:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
44654188432:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
44654188432:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
44654188432:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-verify.out`
115780589456:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
115780589456:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
115780589456:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
115780589456:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
115780589456:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
115780589456:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
115780589456:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-verify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-verify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-cert-verify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out`
237640456080:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
237640456080:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
237640456080:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
237640456080:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
237640456080:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
237640456080:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
237640456080:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out`
213087442832:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
213087442832:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
213087442832:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
213087442832:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
213087442832:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
213087442832:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
213087442832:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
client: SSL_connect -1
server: SSL_accept -1

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-ca-cert-certverify.out`
85067863952:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
85067863952:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
85067863952:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
85067863952:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
85067863952:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
85067863952:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
85067863952:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
server: SSL_accept -1
client: SSL_connect -1

==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1

==== run-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1

==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-nocert-noverify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-nocert-verify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-nocert-certverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-nocert-certverify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out
success

==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out`
183738619792:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out
client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out`
220114884496:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-nocert-noverify.out`
123151947664:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-nocert-noverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-verify.out`
228649195408:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-verify.out
client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out`
246038910864:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-nocert-verify.out`
24008005520:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-nocert-verify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-verify.out
client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-nocert-verify.out
client-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out`
42921498512:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out
client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out`
183714600848:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-nocert-certverify.out`
227611137936:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-nocert-certverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-cert-verify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-cert-certverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-ca-cert-certverify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out
success

==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out`
74188117904:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
74188117904:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
74188117904:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
74188117904:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
74188117904:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
74188117904:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
74188117904:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out
client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out`
270763120528:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
270763120528:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
270763120528:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
270763120528:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
270763120528:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
270763120528:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
270763120528:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-noverify.out`
102766352272:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
102766352272:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
102766352272:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
102766352272:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
102766352272:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
102766352272:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
102766352272:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-noverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-noverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-noverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-cert-noverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-cert-noverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out`
125681080208:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
125681080208:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
125681080208:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
125681080208:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
125681080208:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
125681080208:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
125681080208:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out
client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out`
104793167760:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
104793167760:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
104793167760:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
104793167760:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
104793167760:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
server: 104793167760:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
SSL_accept -1
104793167760:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-verify.out`
100321810320:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
100321810320:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
100321810320:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
100321810320:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
100321810320:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
100321810320:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
100321810320:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-verify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-verify.out
client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-cert-verify.out
client-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out`
51033626512:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
51033626512:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
51033626512:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
51033626512:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
51033626512:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
51033626512:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
51033626512:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out
client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out`
86555678608:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
86555678608:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
86555678608:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
86555678608:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
86555678608:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
86555678608:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
86555678608:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-certverify.out`
165810214800:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
165810214800:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
165810214800:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
165810214800:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
165810214800:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
165810214800:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
165810214800:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
server: SSL_accept -1
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-certverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-ca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-certverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-cert-certverify.out server-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-cert-certverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out`
79169542032:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
274907174800:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
78057002896:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
263794333584:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out`
170620901264:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out`
181008504720:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out`
284824803216:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out`
75470231440:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out`
43413362576:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out`
43707996048:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out`
243115431824:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-nocert-verify.out`
222615295888:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out`
86560348048:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out`
155944785808:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out`
159982933904:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-cert-verify.out`
grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-cert-verify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out
success

==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out`
176786954128:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
292214200208:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
71063902096:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
19929241488:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116
client: SSL_read -1

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out`
103940347792:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out`
232012142480:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out`
204374316944:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
204374316944:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
204374316944:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
204374316944:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out`
56776759184:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
56776759184:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
56776759184:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
56776759184:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify.out`
185919870864:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
185919870864:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
185919870864:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
185919870864:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out`
244038752144:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
244038752144:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
244038752144:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
244038752144:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out`
159268247440:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
159268247440:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
159268247440:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
159268247440:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify.out`
255015999376:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
255015999376:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
255015999376:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
255015999376:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify.out
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out`
139647293328:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
139647293328:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
139647293328:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
139647293328:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out`
97559402384:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
97559402384:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
97559402384:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
97559402384:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1

==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl31-fakeca-cert-certverify.out`
161050105744:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
161050105744:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
161050105744:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
161050105744:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1

==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1

==== run-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1

==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out`
205235410832:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
205235410832:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
205235410832:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
205235410832:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out
client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out`
222754363280:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
222754363280:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
222754363280:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
222754363280:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out`
162131056528:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
162131056528:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
162131056528:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
162131056528:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out`
205400938384:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
205400938384:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
205400938384:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
205400938384:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out`
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
200329287568:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
200329287568:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
200329287568:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
client: SSL_read 0200329287568:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:

server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out`
70078453648:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
70078453648:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
70078453648:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
70078453648:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out`
44426729360:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out
client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out`
32772446096:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-nocert-noverify.out`
153369892752:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-nocert-noverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out`
209284077456:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out
client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out`
190815278992:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-nocert-verify.out`
164889761680:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out
client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out
client-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out`
128767530896:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out`
135101618064:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-nocert-certverify.out`
33643304848:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out
success

==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out`
227501922192:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
227501922192:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
227501922192:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
227501922192:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out
client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out
client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out
client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out`
237929994128:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
237929994128:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
237929994128:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
237929994128:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
client: SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out`
31231694736:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
31231694736:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
31231694736:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
31231694736:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out`
282187667344:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
282187667344:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
282187667344:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
282187667344:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out
client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out
client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out
client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out:verify: fail
server-cert-client-libressl-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out`
259034929040:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
259034929040:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
259034929040:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
259034929040:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
client: SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out`
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
105079658384:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
105079658384:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
105079658384:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
client: 105079658384:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921:
SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out`
80195344272:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
80195344272:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
80195344272:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
80195344272:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out
client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out`
125966423952:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
125966423952:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
125966423952:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
125966423952:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify.out`
21634799504:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
21634799504:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
21634799504:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
21634799504:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out`
34071074704:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
34071074704:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
34071074704:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
34071074704:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out
client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out`
241662433168:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
241662433168:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
241662433168:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
241662433168:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-verify.out`
130170427280:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
130170427280:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
130170427280:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
130170427280:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-verify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out
client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out
client-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out`
261680568208:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
261680568208:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
261680568208:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
261680568208:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out
client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out`
68385183632:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
68385183632:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
68385183632:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
68385183632:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify.out`
211609327504:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134:
211609327504:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646:
211609327504:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455:
211609327504:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify.out
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify.out:verify: fail
client-cert-client-libressl-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/elibressl  ../libressl/server >server-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-nocert-noverify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-nocert-noverify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-nocert-verify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-nocert-verify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-nocert-noverify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-nocert-noverify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-nocert-noverify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-verify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-nocert-verify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-nocert-verify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-nocert-verify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-nocert-verify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-nocert-certverify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-nocert-certverify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-nocert-certverify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-verify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-cert-verify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-cert-verify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-cert-verify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-noverify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-cert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-cert-noverify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-cert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-cert-noverify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-cert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-cert-noverify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-cert-noverify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-verify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-cert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-cert-verify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-cert-verify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-cert-verify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-cert-verify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl31-noca-cert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl11-noca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-noverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-noverify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify.out
client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-verify.out
client-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-verify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-verify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-verify.out
client-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-verify.out server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-verify.out
client-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-verify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out
client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-certverify.out
client-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out
client-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-certverify.out server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-certverify.out
client-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-noverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-nocert-noverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-nocert-noverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-nocert-noverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-nocert-noverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-verify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-nocert-verify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-nocert-verify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-nocert-verify.out server-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-nocert-verify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-certverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-nocert-certverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-nocert-certverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-nocert-certverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-nocert-certverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify.out
client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-verify.out
client-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-verify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-verify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-verify.out
client-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-verify.out server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-verify.out
client-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-verify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify.out
client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-certverify.out
client-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-certverify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-openssl31-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-certverify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-certverify.out
client-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-certverify.out server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-certverify.out
client-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-certverify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-openssl31-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-noverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-cert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-cert-noverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-cert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-cert-noverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-cert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-cert-noverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-cert-noverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-verify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-cert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-cert-verify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-cert-verify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-cert-verify.out server-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-cert-verify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-certverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-cert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-cert-certverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl31-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-cert-certverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-cert-certverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-cert-certverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl31-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-nocert-noverify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-nocert-noverify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-nocert-verify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-nocert-verify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-nocert-noverify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-nocert-noverify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-nocert-noverify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-verify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-nocert-verify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-nocert-verify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-nocert-verify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-nocert-verify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-nocert-certverify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-nocert-certverify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-nocert-certverify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-ca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-ca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-noverify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-cert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-cert-noverify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-cert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-cert-noverify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-cert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-cert-noverify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-cert-noverify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-verify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-cert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-cert-verify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-cert-verify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-cert-verify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-cert-verify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl31-ca-cert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl11-ca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl31-ca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-nocert-noverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-nocert-noverify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-verify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-nocert-verify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-nocert-verify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-nocert-verify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-nocert-certverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-nocert-certverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-nocert-certverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-nocert-certverify.out
success

==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-noverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-nocert-noverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-nocert-noverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-nocert-noverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-nocert-noverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-verify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-nocert-verify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-nocert-verify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-nocert-verify.out server-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-nocert-verify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-certverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-nocert-certverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-nocert-certverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-nocert-certverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-nocert-certverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-certverify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl31-ca-cert-certverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-openssl11-ca-cert-certverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-openssl31-ca-cert-certverify.out
success

==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-noverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-cert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-cert-noverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-cert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-cert-noverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-cert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-cert-noverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-cert-noverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-verify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-cert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-cert-verify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-cert-verify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-cert-verify.out server-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-cert-verify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-certverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-cert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-cert-certverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl31-ca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-cert-certverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-cert-certverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-cert-certverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-cert-certverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl31-ca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-nocert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-nocert-verify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-cert-verify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out
success

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-cert-verify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-cert-verify.out
success

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out        `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-cert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-cert-noverify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-cert-noverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-cert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-cert-noverify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-cert-noverify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-cert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-cert-verify.out
client-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-cert-verify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-cert-verify.out server-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-cert-verify.out
client-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1

==== run-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl31-fakeca-cert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1

==== run-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-cert-certverify.out      -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-nocert-verify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-verify.out server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
client: SSL_read 000000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:

server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-nocert-noverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-nocert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-nocert-noverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-nocert-noverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-nocert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-nocert-verify.out server-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-nocert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-noverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
client: SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out
client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out
client-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out
client-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out
client-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out
client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out
client-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl11-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out
client-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out    -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out
client-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl31-noca-cert-noverify-server-openssl31-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-cert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-cert-noverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-cert-noverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-cert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-cert-noverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-cert-noverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-verify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-cert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-cert-verify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-cert-verify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-cert-verify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-cert-verify.out server-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-cert-verify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-cert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-cert-certverify.out
client-cert-client-openssl11-noca-cert-verify-server-openssl31-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-cert-certverify.out    -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-cert-certverify.out server-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-cert-certverify.out
client-cert-client-openssl31-noca-cert-verify-server-openssl31-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-nocert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-nocert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-nocert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-nocert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out
client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-nocert-noverify.out
client-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out
client-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-nocert-noverify.out server-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-nocert-noverify.out
client-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-verify.out
client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-nocert-verify.out
client-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-nocert-verify.out
client-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-nocert-verify.out server-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-nocert-verify.out
client-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out
client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-nocert-certverify.out
client-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out
client-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-nocert-certverify.out server-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-nocert-certverify.out
client-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-cert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-cert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-cert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-cert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-cert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-cert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-noca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify.out
client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-verify.out
client-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-verify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-verify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-verify.out
client-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-verify.out server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-verify.out
client-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-verify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out
client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-certverify.out
client-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out
client-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-certverify.out server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-certverify.out
client-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-noverify.out
client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-nocert-noverify.out
client-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-nocert-noverify.out
client-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-nocert-noverify.out server-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-nocert-noverify.out
client-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-verify.out
client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-nocert-verify.out
client-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-nocert-verify.out
client-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-nocert-verify.out server-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-nocert-verify.out
client-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-certverify.out
client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-nocert-certverify.out
client-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-nocert-certverify.out
client-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-nocert-certverify.out server-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-nocert-certverify.out
client-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-verify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-verify.out
server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-cert-verify.out
server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-cert-verify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-cert-verify.out
server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-cert-verify.out server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-cert-verify.out
server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-certverify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-certverify.out
server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-cert-certverify.out
server-cert-client-openssl11-ca-cert-noverify-server-openssl31-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-cert-certverify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-cert-certverify.out
server-cert-client-openssl31-ca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-cert-certverify.out server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-cert-certverify.out
server-cert-client-openssl31-ca-cert-noverify-server-openssl31-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-verify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-verify.out
server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-cert-verify.out
server-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-cert-verify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-cert-verify.out
server-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-cert-verify.out server-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-cert-verify.out
server-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-certverify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-certverify.out
server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-cert-certverify.out
server-cert-client-openssl11-ca-cert-verify-server-openssl31-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-cert-certverify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-cert-certverify.out
server-cert-client-openssl31-ca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-cert-certverify.out server-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-cert-certverify.out
server-cert-client-openssl31-ca-cert-verify-server-openssl31-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-nocert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-nocert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-nocert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-nocert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out
client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-nocert-noverify.out
client-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out
client-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-nocert-noverify.out server-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-nocert-noverify.out
client-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-verify.out
client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-nocert-verify.out
client-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-nocert-verify.out
client-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-nocert-verify.out server-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-nocert-verify.out
client-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out
client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-nocert-certverify.out
client-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out
client-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-nocert-certverify.out server-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-nocert-certverify.out
client-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-ca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-ca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-ca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-ca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-ca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-nocert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-nocert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-verify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-nocert-verify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-nocert-verify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-nocert-verify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-nocert-certverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-nocert-certverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-nocert-certverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-nocert-certverify.out
success

==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-noverify.out
client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-nocert-noverify.out
client-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-nocert-noverify.out
client-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-nocert-noverify.out server-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-nocert-noverify.out
client-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-verify.out
client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-nocert-verify.out
client-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-nocert-verify.out
client-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-nocert-verify.out server-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-nocert-verify.out
client-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-certverify.out
client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-nocert-certverify.out
client-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-nocert-certverify.out
client-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-nocert-certverify.out server-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-nocert-certverify.out
client-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-certverify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl31-ca-cert-certverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-openssl11-ca-cert-certverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-openssl31-ca-cert-certverify.out
success

==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-certverify.out
success

==== run-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl31-ca-cert-certverify.out
success

==== run-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-verify-server-openssl11-ca-cert-certverify.out
success

==== run-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-verify-server-openssl31-ca-cert-certverify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out
client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out
client-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out
client-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out server-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out
client-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-nocert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-nocert-verify.out server-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-cert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-cert-verify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-cert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out  -C ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-cert-noverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-cert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out
success

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-cert-verify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-cert-verify.out
success

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-cert-certverify.out  -C ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-nocert-verify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
client: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
client: SSL_read 0
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out`
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
client: SSL_read 0
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
client: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
SSL_read 0
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-verify.out server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out`
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
client: SSL_read 0
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
client: SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
client: SSL_read 0
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out
client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-nocert-noverify.out
client-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out
client-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-nocert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-nocert-noverify.out server-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-nocert-noverify.out
client-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-nocert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-nocert-verify.out server-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-nocert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
client: SSL_read 0
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out
server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
client: SSL_read 0
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-cert-verify.out
server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out`
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
client: SSL_read 0
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out
server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-cert-verify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
client: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
SSL_read 0
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-cert-verify.out server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-cert-verify.out
server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out`
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
client: SSL_read 0
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out
server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
client: SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-cert-certverify.out
server-cert-client-openssl11-ca-cert-noverify-server-openssl31-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out`
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
client: SSL_read 0
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out
server-cert-client-openssl31-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
client: SSL_read 0
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-cert-certverify.out server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-cert-certverify.out
server-cert-client-openssl31-ca-cert-noverify-server-openssl31-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-verify.out`
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
client: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
SSL_read 0
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-verify.out
server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-cert-verify.out`
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
client: SSL_read 0
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-cert-verify.out
server-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-cert-verify.out`
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
client: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-cert-verify.out
server-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-cert-verify.out`
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
client: SSL_read 0
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-cert-verify.out server-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-cert-verify.out
server-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out`
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
client: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out
server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
client: SSL_read 0
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-cert-certverify.out
server-cert-client-openssl11-ca-cert-verify-server-openssl31-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
client: SSL_read 0
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out
server-cert-client-openssl31-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
client: SSL_read 000000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:

00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-cert-certverify.out server-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-cert-certverify.out
server-cert-client-openssl31-ca-cert-verify-server-openssl31-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-nocert-noverify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-nocert-noverify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-nocert-verify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-nocert-verify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-nocert-noverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-nocert-noverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-nocert-noverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-nocert-verify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-nocert-verify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-nocert-verify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-nocert-certverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-nocert-certverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-nocert-certverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-cert-verify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-cert-verify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-cert-noverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-cert-noverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-cert-noverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-cert-noverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-cert-noverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
server: SSL_accept -1
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-cert-verify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
server: SSL_accept -1
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-cert-verify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-cert-verify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-noca-cert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-noca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-noverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-noverify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-verify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-verify.out server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-verify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify.out server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-nocert-noverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-nocert-noverify.out        127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-nocert-noverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-nocert-noverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-nocert-verify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-nocert-verify.out      -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-nocert-verify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-nocert-verify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-nocert-certverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-nocert-certverify.out      -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-nocert-certverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-nocert-certverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-noverify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out`
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out`
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
client: SSL_read 0
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-cert-noverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-cert-noverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-cert-noverify.out    -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-cert-noverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-cert-noverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-cert-noverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-verify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-cert-verify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-cert-verify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-cert-verify.out    -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-cert-verify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-cert-verify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-cert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-cert-certverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-cert-certverify.out    -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-cert-certverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-cert-certverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-noca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-nocert-noverify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-nocert-noverify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-nocert-verify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-nocert-verify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-nocert-noverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-nocert-noverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-nocert-noverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-nocert-verify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-nocert-verify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-nocert-verify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-nocert-certverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-nocert-certverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-nocert-certverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-ca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-ca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out`
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
server: SSL_accept -1
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-cert-noverify.out`
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
server: SSL_accept -1
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-cert-noverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-cert-noverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-cert-noverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-cert-noverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
server: SSL_accept -1
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-cert-verify.out`
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
server: SSL_accept -1
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-cert-verify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-cert-verify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-cert-verify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out`
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-ca-cert-certverify.out`
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
server: SSL_accept -1
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-ca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-nocert-noverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-nocert-noverify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-nocert-verify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-nocert-verify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-nocert-certverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-nocert-certverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-nocert-certverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-nocert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-nocert-certverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-nocert-certverify.out
success

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-nocert-noverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-nocert-noverify.out  -C ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-nocert-noverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-nocert-noverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-nocert-verify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-nocert-verify.out  -C ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-nocert-verify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-nocert-verify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-nocert-certverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-nocert-certverify.out  -C ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-nocert-certverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-nocert-certverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-cert-noverify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-cert-verify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-ca-cert-certverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-cert-certverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-cert-certverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-cert-certverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-ca-cert-certverify.out
success

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
server: SSL_accept -1
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-cert-noverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
server: SSL_accept -1
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-cert-noverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-cert-noverify.out  -C ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-cert-noverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-cert-noverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-cert-noverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-verify.out`
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
server: SSL_accept -1
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-verify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-cert-verify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-cert-verify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-cert-verify.out  -C ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-cert-verify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-cert-verify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
server: SSL_accept -1
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-cert-certverify.out`
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
server: SSL_accept -10:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:

0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-cert-certverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-ca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-cert-certverify.out  -C ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-cert-certverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-cert-certverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-ca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-verify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-nocert-verify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-cert-verify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out
success

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-cert-verify.out`
grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-cert-verify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-cert-verify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-cert-verify.out
success

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out`
0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt      `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-noverify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3511:
server: SSL_accept -1
00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1590:SSL alert number 116
client: SSL_read 0

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
server: SSL_accept -1
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify.out`
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
server: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
SSL_accept -1
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
server: SSL_accept -1
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
server: SSL_accept -1
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify.out
client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify.out server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify.out
client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
server: SSL_accept -1
client: SSL_connect -1

==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl31-fakeca-cert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
client: SSL_connect -1

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1

==== run-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt    -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-nocert-verify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
client: SSL_connect -1
server: SSL_accept -1

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-noverify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
client: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify.out`
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
client: SSL_read 0
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
client: SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify.out`
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
client: SSL_read 0
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify.out server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out`
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
client: SSL_read 0
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out`
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
client: SSL_read 0
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out`
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
client: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
client: SSL_read 0
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-nocert-noverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-nocert-noverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-nocert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt      127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-nocert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-nocert-noverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-nocert-noverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-nocert-noverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-nocert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-nocert-verify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-nocert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt    -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-nocert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-nocert-verify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-nocert-verify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-nocert-verify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-nocert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-nocert-certverify.out`
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-nocert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt    -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-nocert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-nocert-certverify.out`
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1590:SSL alert number 48
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-nocert-certverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-nocert-certverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-nocert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out
success

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-noverify.out`
grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-noverify.out ||  { sleep 1; grep '^success$' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-noverify.out; }
success
grep '^success$' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-noverify.out
success

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
client: SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
client: SSL_read 000000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:

00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out`
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
client: SSL_read 0
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
client: SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out`
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
client: SSL_read 0
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out`
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
client: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
SSL_read 0
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out
client-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl11-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out`
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
client: SSL_read 0
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713:
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key    `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3524:
client: SSL_read 0
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out
client-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out:verify: fail
server-cert-client-openssl31-fakeca-cert-noverify-server-openssl31-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
server: SSL_accept -1
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
server: SSL_accept -1
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key    127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-cert-noverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
server: SSL_accept -1
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-cert-verify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
server: SSL_accept -1
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-cert-verify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
client: SSL_connect -1
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-cert-verify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-cert-verify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-cert-verify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-cert-verify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-cert-verify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-cert-verify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
server: SSL_accept -1
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify.out`
0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67:
0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587:
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170:
0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921:
server: SSL_accept -1
client: SSL_connect -1
grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify.out
client-cert-client-openssl11-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl11  ../openssl11/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail

==== run-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify ====
LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/server >server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -vv  127.0.0.1 0
!  LD_LIBRARY_PATH=/usr/local/lib/eopenssl31  ../openssl31/client >client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify.out  -C fake-ca.crt  -c server.crt -k server.key  -v  `sed -n 's/listen sock: //p' server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify.out`
00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:598:
00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:788:
00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:217:
00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1890:
client: SSL_connect -1
00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1590:SSL alert number 51
server: SSL_accept -1
grep '^verify: fail' client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify.out server-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify.out
client-cert-client-openssl31-fakeca-cert-verify-server-openssl31-fakeca-cert-certverify.out:verify: fail

==== run-bob ====
Bob, be happy! Tests finished.

SKIP	lib/libssl/interop	Test skipped itself