START lib/libssl/interop 2024-11-23T07:03:10Z ===> libressl ==== run-self-client-server ==== cc -O2 -pipe -DLIBRESSL_HAS_TLS1_3 -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -c /usr/src/regress/lib/libssl/interop/libressl/../client.c cc -O2 -pipe -DLIBRESSL_HAS_TLS1_3 -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -c /usr/src/regress/lib/libssl/interop/libressl/../util.c cc -o client client.o util.o -lssl -lcrypto cc -O2 -pipe -DLIBRESSL_HAS_TLS1_3 -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -c /usr/src/regress/lib/libssl/interop/libressl/../server.c cc -o server server.o util.o -lssl -lcrypto openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key ................................................................................................ ........ writing new private key to '127.0.0.1.key' ----- # check that tls client and server work together LD_LIBRARY_PATH= ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH= ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out ==== run-ldd-client ==== # programs must be linked with correct libraries LD_LIBRARY_PATH= ldd client >ldd-client.out # check that client is linked with LibreSSL grep -q /usr/lib/libcrypto.so ldd-client.out grep -q /usr/lib/libssl.so ldd-client.out # check that client is not linked with OpenSSL ! grep /usr/local/lib/ ldd-client.out ==== run-version-client ==== # check that tls client and server work together LD_LIBRARY_PATH= ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH= ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that runtime version is LibreSSL grep 'SSLEAY_VERSION: LibreSSL' client-self.out SSLeay_version SSLEAY_VERSION: LibreSSL 4.0.0 ==== run-protocol-client ==== # check that tls client and server work together LD_LIBRARY_PATH= ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH= ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that LibreSSL protocol version is TLS 1.3 grep 'Protocol *: TLSv1.3' client-self.out Protocol : TLSv1.3 ==== run-ldd-server ==== # programs must be linked with correct libraries LD_LIBRARY_PATH= ldd server >ldd-server.out # check that server is linked with LibreSSL grep -q /usr/lib/libcrypto.so ldd-server.out grep -q /usr/lib/libssl.so ldd-server.out # check that server is not linked with OpenSSL ! grep /usr/local/lib/ ldd-server.out ==== run-version-server ==== # check that tls client and server work together LD_LIBRARY_PATH= ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH= ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that runtime version is LibreSSL grep 'SSLEAY_VERSION: LibreSSL' server-self.out SSLeay_version SSLEAY_VERSION: LibreSSL 4.0.0 ==== run-protocol-server ==== # check that tls client and server work together LD_LIBRARY_PATH= ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH= ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that LibreSSL protocol version is TLS 1.3 grep 'Protocol *: TLSv1.3' server-self.out Protocol : TLSv1.3 ===> openssl11 ==== run-self-client-server ==== cc -O2 -pipe -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -I /usr/local/include/eopenssl11 -c /usr/src/regress/lib/libssl/interop/openssl11/../client.c cc -O2 -pipe -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -I /usr/local/include/eopenssl11 -c /usr/src/regress/lib/libssl/interop/openssl11/../util.c cc -L /usr/local/lib/eopenssl11 -o client client.o util.o -lssl -lcrypto cc -O2 -pipe -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -I /usr/local/include/eopenssl11 -c /usr/src/regress/lib/libssl/interop/openssl11/../server.c cc -L /usr/local/lib/eopenssl11 -o server server.o util.o -lssl -lcrypto openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key ............................. ............. writing new private key to '127.0.0.1.key' ----- # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out ==== run-ldd-client ==== # programs must be linked with correct libraries LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ldd client >ldd-client.out # check that client is linked with OpenSSL 1.1 grep -q /usr/local/lib/eopenssl11/libcrypto.so ldd-client.out grep -q /usr/local/lib/eopenssl11/libssl.so ldd-client.out # check that client is not linked with LibreSSL ! grep -v libc.so ldd-client.out | grep /usr/lib/ ==== run-version-client ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that runtime version is OpenSSL 1.1 grep 'SSLEAY_VERSION: OpenSSL 1.1' client-self.out SSLeay_version SSLEAY_VERSION: OpenSSL 1.1.1w 11 Sep 2023 ==== run-protocol-client ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that OpenSSL 1.1 protocol version is TLS 1.3 grep 'Protocol *: TLSv1.3' client-self.out Protocol : TLSv1.3 ==== run-ldd-server ==== # programs must be linked with correct libraries LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ldd server >ldd-server.out # check that server is linked with OpenSSL 1.1 grep -q /usr/local/lib/eopenssl11/libcrypto.so ldd-server.out grep -q /usr/local/lib/eopenssl11/libssl.so ldd-server.out # check that server is not linked with LibreSSL ! grep -v libc.so ldd-server.out | grep /usr/lib/ ==== run-version-server ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that runtime version is OpenSSL 1.1 grep 'SSLEAY_VERSION: OpenSSL 1.1' server-self.out SSLeay_version SSLEAY_VERSION: OpenSSL 1.1.1w 11 Sep 2023 ==== run-protocol-server ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that OpenSSL 1.1 protocol version is TLS 1.3 grep 'Protocol *: TLSv1.3' server-self.out Protocol : TLSv1.3 ===> openssl31 Run "pkg_add openssl--%3.1" to run tests against OpenSSL 3.1 SKIPPED ===> openssl32 ==== run-self-client-server ==== cc -O2 -pipe -DOPENSSL_SUPPRESS_DEPRECATED -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -I /usr/local/include/eopenssl32 -c /usr/src/regress/lib/libssl/interop/openssl32/../client.c cc -O2 -pipe -DOPENSSL_SUPPRESS_DEPRECATED -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -I /usr/local/include/eopenssl32 -c /usr/src/regress/lib/libssl/interop/openssl32/../util.c cc -L /usr/local/lib/eopenssl32 -o client client.o util.o -lssl -lcrypto cc -O2 -pipe -DOPENSSL_SUPPRESS_DEPRECATED -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -I /usr/local/include/eopenssl32 -c /usr/src/regress/lib/libssl/interop/openssl32/../server.c cc -L /usr/local/lib/eopenssl32 -o server server.o util.o -lssl -lcrypto openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key ..................................... ......................... writing new private key to '127.0.0.1.key' ----- # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out ==== run-ldd-client ==== # programs must be linked with correct libraries LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ldd client >ldd-client.out # check that client is linked with OpenSSL 3.2 grep -q /usr/local/lib/eopenssl32/libcrypto.so ldd-client.out grep -q /usr/local/lib/eopenssl32/libssl.so ldd-client.out # check that client is not linked with LibreSSL ! grep -v libc.so ldd-client.out | grep /usr/lib/ ==== run-version-client ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that runtime version is OpenSSL 3.2 grep 'SSLEAY_VERSION: OpenSSL 3.2' client-self.out SSLeay_version SSLEAY_VERSION: OpenSSL 3.2.3 3 Sep 2024 ==== run-protocol-client ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that OpenSSL 3.2 protocol version is TLS 1.3 grep 'Protocol *: TLSv1.3' client-self.out Protocol : TLSv1.3 ==== run-ldd-server ==== # programs must be linked with correct libraries LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ldd server >ldd-server.out # check that server is linked with OpenSSL 3.2 grep -q /usr/local/lib/eopenssl32/libcrypto.so ldd-server.out grep -q /usr/local/lib/eopenssl32/libssl.so ldd-server.out # check that server is not linked with LibreSSL ! grep -v libc.so ldd-server.out | grep /usr/lib/ ==== run-version-server ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that runtime version is OpenSSL 3.2 grep 'SSLEAY_VERSION: OpenSSL 3.2' server-self.out SSLeay_version SSLEAY_VERSION: OpenSSL 3.2.3 3 Sep 2024 ==== run-protocol-server ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that OpenSSL 3.2 protocol version is TLS 1.3 grep 'Protocol *: TLSv1.3' server-self.out Protocol : TLSv1.3 ===> netcat ==== run-netcat-client-libressl-server-nc ==== openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key ..................................................................................................................................... ................................................ writing new private key to '127.0.0.1.key' ----- echo "greeting" | nc >server-netcat-client-libressl-server-nc.out -l -c -C 127.0.0.1.crt -K 127.0.0.1.key 127.0.0.1 0 & for i in `jot 1000`; do fstat -p $! >netcat.fstat; grep -q ' stream tcp .*:[1-9][0-9]*$' netcat.fstat && exit 0; done; exit 1 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-netcat-client-libressl-server-nc.out `sed -n 's/.* stream tcp .*:/127.0.0.1 /p' netcat.fstat` # check that the client run successfully to the end grep -q '^success$' client-netcat-client-libressl-server-nc.out # client must have read server greeting grep -q '^<<< greeting$' client-netcat-client-libressl-server-nc.out # netstat server must have read client hello grep -q '^hello$' server-netcat-client-libressl-server-nc.out ==== run-protocol-client-libressl ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' client-netcat-client-libressl-server-nc.out Protocol : TLSv1.3 ==== run-netcat-client-openssl11-server-nc ==== echo "greeting" | nc >server-netcat-client-openssl11-server-nc.out -l -c -C 127.0.0.1.crt -K 127.0.0.1.key 127.0.0.1 0 & for i in `jot 1000`; do fstat -p $! >netcat.fstat; grep -q ' stream tcp .*:[1-9][0-9]*$' netcat.fstat && exit 0; done; exit 1 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-netcat-client-openssl11-server-nc.out `sed -n 's/.* stream tcp .*:/127.0.0.1 /p' netcat.fstat` # check that the client run successfully to the end grep -q '^success$' client-netcat-client-openssl11-server-nc.out # client must have read server greeting grep -q '^<<< greeting$' client-netcat-client-openssl11-server-nc.out # netstat server must have read client hello grep -q '^hello$' server-netcat-client-openssl11-server-nc.out ==== run-protocol-client-openssl11 ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' client-netcat-client-openssl11-server-nc.out Protocol : TLSv1.3 ==== run-netcat-client-openssl32-server-nc ==== echo "greeting" | nc >server-netcat-client-openssl32-server-nc.out -l -c -C 127.0.0.1.crt -K 127.0.0.1.key 127.0.0.1 0 & for i in `jot 1000`; do fstat -p $! >netcat.fstat; grep -q ' stream tcp .*:[1-9][0-9]*$' netcat.fstat && exit 0; done; exit 1 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-netcat-client-openssl32-server-nc.out `sed -n 's/.* stream tcp .*:/127.0.0.1 /p' netcat.fstat` # check that the client run successfully to the end grep -q '^success$' client-netcat-client-openssl32-server-nc.out # client must have read server greeting grep -q '^<<< greeting$' client-netcat-client-openssl32-server-nc.out # netstat server must have read client hello grep -q '^hello$' server-netcat-client-openssl32-server-nc.out ==== run-protocol-client-openssl32 ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' client-netcat-client-openssl32-server-nc.out Protocol : TLSv1.3 ==== run-netcat-client-nc-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-netcat-client-nc-server-libressl.out 127.0.0.1 0 echo "hello" | nc >client-netcat-client-nc-server-libressl.out -c -R 127.0.0.1.crt `sed -n 's/listen sock: //p' server-netcat-client-nc-server-libressl.out` # check that the server child run successfully to the end grep -q '^success$' server-netcat-client-nc-server-libressl.out || { sleep 1; grep -q '^success$' server-netcat-client-nc-server-libressl.out; } # server must have read client hello grep -q '^<<< hello$' server-netcat-client-nc-server-libressl.out # client must have read server greeting grep -q '^greeting$' client-netcat-client-nc-server-libressl.out ==== run-netcat-client-nc-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-netcat-client-nc-server-openssl11.out 127.0.0.1 0 echo "hello" | nc >client-netcat-client-nc-server-openssl11.out -c -R 127.0.0.1.crt `sed -n 's/listen sock: //p' server-netcat-client-nc-server-openssl11.out` # check that the server child run successfully to the end grep -q '^success$' server-netcat-client-nc-server-openssl11.out || { sleep 1; grep -q '^success$' server-netcat-client-nc-server-openssl11.out; } # server must have read client hello grep -q '^<<< hello$' server-netcat-client-nc-server-openssl11.out # client must have read server greeting grep -q '^greeting$' client-netcat-client-nc-server-openssl11.out ==== run-netcat-client-nc-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-netcat-client-nc-server-openssl32.out 127.0.0.1 0 echo "hello" | nc >client-netcat-client-nc-server-openssl32.out -c -R 127.0.0.1.crt `sed -n 's/listen sock: //p' server-netcat-client-nc-server-openssl32.out` # check that the server child run successfully to the end grep -q '^success$' server-netcat-client-nc-server-openssl32.out || { sleep 1; grep -q '^success$' server-netcat-client-nc-server-openssl32.out; } # server must have read client hello grep -q '^<<< hello$' server-netcat-client-nc-server-openssl32.out # client must have read server greeting grep -q '^greeting$' client-netcat-client-nc-server-openssl32.out ==== run-protocol-client-libressl ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' client-netcat-client-libressl-server-nc.out Protocol : TLSv1.3 ==== run-protocol-client-openssl11 ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' client-netcat-client-openssl11-server-nc.out Protocol : TLSv1.3 ==== run-protocol-client-openssl32 ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' client-netcat-client-openssl32-server-nc.out Protocol : TLSv1.3 ==== run-protocol-server-libressl ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' server-netcat-client-nc-server-libressl.out Protocol : TLSv1.3 ==== run-protocol-server-openssl11 ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' server-netcat-client-nc-server-openssl11.out Protocol : TLSv1.3 ==== run-protocol-server-openssl32 ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' server-netcat-client-nc-server-openssl32.out Protocol : TLSv1.3 ===> session ==== run-session-client-libressl-server-libressl ==== openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key ........ .................... writing new private key to '127.0.0.1.key' ----- # TLS 1.3 needs some extra setup for session reuse DISABLED ==== run-session-client-libressl-server-openssl11 ==== # TLS 1.3 needs some extra setup for session reuse DISABLED ==== run-session-client-openssl11-server-libressl ==== # TLS 1.3 needs some extra setup for session reuse DISABLED ==== run-session-client-openssl11-server-openssl11 ==== # TLS 1.3 needs some extra setup for session reuse DISABLED ===> botan ==== run-client-botan-server-libressl ==== c++ -I/usr/local/include/botan-2 -Wall -MD -MP -c /usr/src/regress/lib/libssl/interop/botan/client.cpp c++ -L/usr/local/lib -o client client.o -lbotan-2 /usr/local/bin/botan keygen >ca.key.tmp mv ca.key.tmp ca.key /usr/local/bin/botan gen_self_signed ca.key ca >ca.crt.tmp --organization=tls-regress --ca mv ca.crt.tmp ca.crt /usr/local/bin/botan keygen >server.key.tmp mv server.key.tmp server.key /usr/local/bin/botan gen_pkcs10 server.key localhost >server.req.tmp --organization=tls-regress --dns=127.0.0.1 mv server.req.tmp server.req /usr/local/bin/botan sign_cert ca.crt ca.key server.req >server.crt.tmp mv server.crt.tmp server.crt LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-libressl.out -c server.crt -k server.key 127.0.0.1 0 ./client >client-botan.out -C ca.crt 127.0.0.1 `sed -n 's/listen sock: 127.0.0.1 //p' server-libressl.out` # check that the server child run successfully to the end grep -q '^success$' server-libressl.out || { sleep 1; grep -q '^success$' server-libressl.out; } # server must have read client hello grep -q '^<<< hello$' server-libressl.out # check that the client run successfully to the end grep -q '^success$' client-botan.out # client must have read server greeting grep -q '^<<< greeting$' client-botan.out # currently botan supports TLS 1.2, adapt later grep -q ' Protocol *: TLSv1.2$' server-libressl.out ==== run-client-botan-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-openssl11.out -c server.crt -k server.key 127.0.0.1 0 ./client >client-botan.out -C ca.crt 127.0.0.1 `sed -n 's/listen sock: 127.0.0.1 //p' server-openssl11.out` # check that the server child run successfully to the end grep -q '^success$' server-openssl11.out || { sleep 1; grep -q '^success$' server-openssl11.out; } # server must have read client hello grep -q '^<<< hello$' server-openssl11.out # check that the client run successfully to the end grep -q '^success$' client-botan.out # client must have read server greeting grep -q '^<<< greeting$' client-botan.out # currently botan supports TLS 1.2, adapt later grep -q ' Protocol *: TLSv1.2$' server-openssl11.out ==== run-client-botan-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-openssl32.out -c server.crt -k server.key 127.0.0.1 0 ./client >client-botan.out -C ca.crt 127.0.0.1 `sed -n 's/listen sock: 127.0.0.1 //p' server-openssl32.out` # check that the server child run successfully to the end grep -q '^success$' server-openssl32.out || { sleep 1; grep -q '^success$' server-openssl32.out; } # server must have read client hello grep -q '^<<< hello$' server-openssl32.out # check that the client run successfully to the end grep -q '^success$' client-botan.out # client must have read server greeting grep -q '^<<< greeting$' client-botan.out # currently botan supports TLS 1.2, adapt later grep -q ' Protocol *: TLSv1.2$' server-openssl32.out ===> version ==== run-version-client-libressl-any-server-libressl-any ==== openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key .......................................................................... .................. writing new private key to '127.0.0.1.key' ----- LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-any-server-libressl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-any-server-libressl-any.out `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-libressl-any.out` grep -q '^success$' server-version-client-libressl-any-server-libressl-any.out || { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-libressl-any.out; } grep -q '^success$' client-version-client-libressl-any-server-libressl-any.out ==== check-version-client-libressl-any-server-libressl-any ==== Protocol : TLSv1.3 Protocol : TLSv1.3 grep -q ' Protocol *: TLSv1.3$' client-version-client-libressl-any-server-libressl-any.out grep -q ' Protocol *: TLSv1.3$' server-version-client-libressl-any-server-libressl-any.out ==== run-version-client-libressl-any-server-openssl11-any ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-any-server-openssl11-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-any-server-openssl11-any.out `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-openssl11-any.out` grep -q '^success$' server-version-client-libressl-any-server-openssl11-any.out || { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-openssl11-any.out; } grep -q '^success$' client-version-client-libressl-any-server-openssl11-any.out ==== check-version-client-libressl-any-server-openssl11-any ==== Protocol : TLSv1.3 Protocol : TLSv1.3 grep -q ' Protocol *: TLSv1.3$' client-version-client-libressl-any-server-openssl11-any.out grep -q ' Protocol *: TLSv1.3$' server-version-client-libressl-any-server-openssl11-any.out ==== run-version-client-openssl11-any-server-libressl-any ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-any-server-libressl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-any-server-libressl-any.out `sed -n 's/listen sock: //p' server-version-client-openssl11-any-server-libressl-any.out` grep -q '^success$' server-version-client-openssl11-any-server-libressl-any.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-any-server-libressl-any.out; } grep -q '^success$' client-version-client-openssl11-any-server-libressl-any.out ==== check-version-client-openssl11-any-server-libressl-any ==== Protocol : TLSv1.3 Protocol : TLSv1.3 grep -q ' Protocol *: TLSv1.3$' client-version-client-openssl11-any-server-libressl-any.out grep -q ' Protocol *: TLSv1.3$' server-version-client-openssl11-any-server-libressl-any.out ==== run-version-client-libressl-any-server-libressl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-any-server-libressl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-any-server-libressl-TLS1_2.out `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-libressl-TLS1_2.out` grep -q '^success$' server-version-client-libressl-any-server-libressl-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-libressl-TLS1_2.out; } grep -q '^success$' client-version-client-libressl-any-server-libressl-TLS1_2.out ==== check-version-client-libressl-any-server-libressl-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-libressl-any-server-libressl-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-libressl-any-server-libressl-TLS1_2.out ==== run-version-client-libressl-any-server-openssl11-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-any-server-openssl11-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-any-server-openssl11-TLS1_2.out `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-openssl11-TLS1_2.out` grep -q '^success$' server-version-client-libressl-any-server-openssl11-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-openssl11-TLS1_2.out; } grep -q '^success$' client-version-client-libressl-any-server-openssl11-TLS1_2.out ==== check-version-client-libressl-any-server-openssl11-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-libressl-any-server-openssl11-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-libressl-any-server-openssl11-TLS1_2.out ==== run-version-client-openssl11-any-server-libressl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-any-server-libressl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-any-server-libressl-TLS1_2.out `sed -n 's/listen sock: //p' server-version-client-openssl11-any-server-libressl-TLS1_2.out` grep -q '^success$' server-version-client-openssl11-any-server-libressl-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-any-server-libressl-TLS1_2.out; } grep -q '^success$' client-version-client-openssl11-any-server-libressl-TLS1_2.out ==== check-version-client-openssl11-any-server-libressl-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-openssl11-any-server-libressl-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-openssl11-any-server-libressl-TLS1_2.out ==== run-version-client-libressl-TLS1_2-server-libressl-any ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1_2-server-libressl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_2-server-libressl-any.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-libressl-any.out` grep -q '^success$' server-version-client-libressl-TLS1_2-server-libressl-any.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_2-server-libressl-any.out; } grep -q '^success$' client-version-client-libressl-TLS1_2-server-libressl-any.out ==== check-version-client-libressl-TLS1_2-server-libressl-any ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-libressl-TLS1_2-server-libressl-any.out grep -q ' Protocol *: TLSv1.2$' server-version-client-libressl-TLS1_2-server-libressl-any.out ==== run-version-client-libressl-TLS1_2-server-openssl11-any ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1_2-server-openssl11-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_2-server-openssl11-any.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-openssl11-any.out` grep -q '^success$' server-version-client-libressl-TLS1_2-server-openssl11-any.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_2-server-openssl11-any.out; } grep -q '^success$' client-version-client-libressl-TLS1_2-server-openssl11-any.out ==== check-version-client-libressl-TLS1_2-server-openssl11-any ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-libressl-TLS1_2-server-openssl11-any.out grep -q ' Protocol *: TLSv1.2$' server-version-client-libressl-TLS1_2-server-openssl11-any.out ==== run-version-client-openssl11-TLS1_2-server-libressl-any ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1_2-server-libressl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_2-server-libressl-any.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_2-server-libressl-any.out` grep -q '^success$' server-version-client-openssl11-TLS1_2-server-libressl-any.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-TLS1_2-server-libressl-any.out; } grep -q '^success$' client-version-client-openssl11-TLS1_2-server-libressl-any.out ==== check-version-client-openssl11-TLS1_2-server-libressl-any ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-openssl11-TLS1_2-server-libressl-any.out grep -q ' Protocol *: TLSv1.2$' server-version-client-openssl11-TLS1_2-server-libressl-any.out ==== run-version-client-libressl-TLS1_2-server-libressl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out` grep -q '^success$' server-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out; } grep -q '^success$' client-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out ==== check-version-client-libressl-TLS1_2-server-libressl-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out ==== run-version-client-libressl-TLS1_2-server-openssl11-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out` grep -q '^success$' server-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out; } grep -q '^success$' client-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out ==== check-version-client-libressl-TLS1_2-server-openssl11-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out ==== run-version-client-openssl11-TLS1_2-server-libressl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out` grep -q '^success$' server-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out; } grep -q '^success$' client-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out ==== check-version-client-openssl11-TLS1_2-server-libressl-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out ==== run-version-client-openssl11-any-server-openssl11-any ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-openssl11-any-server-openssl11-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-any-server-openssl11-any.out `sed -n 's/listen sock: //p' server-version-client-openssl11-any-server-openssl11-any.out` grep -q '^success$' server-version-client-openssl11-any-server-openssl11-any.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-any-server-openssl11-any.out; } grep -q '^success$' client-version-client-openssl11-any-server-openssl11-any.out ==== check-version-client-openssl11-any-server-openssl11-any ==== Protocol : TLSv1.3 Protocol : TLSv1.3 grep -q ' Protocol *: TLSv1.3$' client-version-client-openssl11-any-server-openssl11-any.out grep -q ' Protocol *: TLSv1.3$' server-version-client-openssl11-any-server-openssl11-any.out ==== run-version-client-openssl11-any-server-openssl11-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-openssl11-any-server-openssl11-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-any-server-openssl11-TLS1_2.out `sed -n 's/listen sock: //p' server-version-client-openssl11-any-server-openssl11-TLS1_2.out` grep -q '^success$' server-version-client-openssl11-any-server-openssl11-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-any-server-openssl11-TLS1_2.out; } grep -q '^success$' client-version-client-openssl11-any-server-openssl11-TLS1_2.out ==== check-version-client-openssl11-any-server-openssl11-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-openssl11-any-server-openssl11-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-openssl11-any-server-openssl11-TLS1_2.out ==== run-version-client-openssl11-TLS1_2-server-openssl11-any ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-openssl11-TLS1_2-server-openssl11-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_2-server-openssl11-any.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_2-server-openssl11-any.out` grep -q '^success$' server-version-client-openssl11-TLS1_2-server-openssl11-any.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-TLS1_2-server-openssl11-any.out; } grep -q '^success$' client-version-client-openssl11-TLS1_2-server-openssl11-any.out ==== check-version-client-openssl11-TLS1_2-server-openssl11-any ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-openssl11-TLS1_2-server-openssl11-any.out grep -q ' Protocol *: TLSv1.2$' server-version-client-openssl11-TLS1_2-server-openssl11-any.out ==== run-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out` grep -q '^success$' server-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out; } grep -q '^success$' client-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out ==== check-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out ===> cipher LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client -l ALL -L >client-libressl.ciphers.tmp sed -n 's/^cipher //p' client-libressl.ciphers rm client-libressl.ciphers.tmp openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key ................................... ......................................................................................................................... writing new private key to '127.0.0.1.key' ----- openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=ca/CN=root/ -nodes -newkey rsa -keyout ca.key -x509 -out ca.crt Generating a 2048 bit RSA private key ................... ..................................... writing new private key to 'ca.key' ----- openssl dsaparam -genkey -out dsa.key 2048 Generating DSA parameters, 2048 bit long prime This could take some time ....................* ......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................* openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=dsa/CN=localhost/ -nodes -key dsa.key -out dsa.req openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt -req -in dsa.req -out dsa.crt Signature ok subject=/L=OpenBSD/O=tls-regress/OU=dsa/CN=localhost openssl ecparam -genkey -name secp256r1 -out ec.key using curve name prime256v1 instead of secp256r1 openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=ec/CN=localhost/ -nodes -key ec.key -out ec.req openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt -req -in ec.req -out ec.crt Signature ok subject=/L=OpenBSD/O=tls-regress/OU=ec/CN=localhost openssl genrsa -out rsa.key 2048 Generating RSA private key, 2048 bit long modulus ...................................................... .............. e is 65537 (0x010001) openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=rsa/CN=localhost/ -nodes -key rsa.key -out rsa.req openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt -req -in rsa.req -out rsa.crt Signature ok subject=/L=OpenBSD/O=tls-regress/OU=rsa/CN=localhost LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server -l ALL -L >server-libressl.ciphers.tmp sed -n 's/^cipher //p' server-libressl.ciphers rm server-libressl.ciphers.tmp # get ciphers shared between client and server sort client-libressl.ciphers server-libressl.ciphers >client-libressl-server-libressl.ciphers.tmp uniq -d client-libressl-server-libressl.ciphers # we are only interested in ciphers supported by libressl sort client-libressl-server-libressl.ciphers client-libressl.ciphers >client-libressl-server-libressl.ciphers.tmp uniq -d client-libressl-server-libressl.ciphers rm client-libressl-server-libressl.ciphers.tmp LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server -l ALL -L >server-openssl11.ciphers.tmp sed -n 's/^cipher //p' server-openssl11.ciphers rm server-openssl11.ciphers.tmp # get ciphers shared between client and server sort client-libressl.ciphers server-openssl11.ciphers >client-libressl-server-openssl11.ciphers.tmp uniq -d client-libressl-server-openssl11.ciphers # we are only interested in ciphers supported by libressl sort client-libressl-server-openssl11.ciphers client-libressl.ciphers >client-libressl-server-openssl11.ciphers.tmp # OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers sed -i '/^TLS_/d' client-libressl-server-openssl11.ciphers.tmp uniq -d client-libressl-server-openssl11.ciphers rm client-libressl-server-openssl11.ciphers.tmp LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server -l ALL -L >server-openssl32.ciphers.tmp sed -n 's/^cipher //p' server-openssl32.ciphers rm server-openssl32.ciphers.tmp # get ciphers shared between client and server sort client-libressl.ciphers server-openssl32.ciphers >client-libressl-server-openssl32.ciphers.tmp uniq -d client-libressl-server-openssl32.ciphers # we are only interested in ciphers supported by libressl sort client-libressl-server-openssl32.ciphers client-libressl.ciphers >client-libressl-server-openssl32.ciphers.tmp # OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers sed -i '/^TLS_/d' client-libressl-server-openssl32.ciphers.tmp uniq -d client-libressl-server-openssl32.ciphers rm client-libressl-server-openssl32.ciphers.tmp LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client -l ALL -L >client-openssl11.ciphers.tmp sed -n 's/^cipher //p' client-openssl11.ciphers rm client-openssl11.ciphers.tmp # get ciphers shared between client and server sort client-openssl11.ciphers server-libressl.ciphers >client-openssl11-server-libressl.ciphers.tmp uniq -d client-openssl11-server-libressl.ciphers # we are only interested in ciphers supported by libressl sort client-openssl11-server-libressl.ciphers client-libressl.ciphers >client-openssl11-server-libressl.ciphers.tmp # OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers sed -i '/^TLS_/d' client-openssl11-server-libressl.ciphers.tmp uniq -d client-openssl11-server-libressl.ciphers rm client-openssl11-server-libressl.ciphers.tmp # get ciphers shared between client and server sort client-openssl11.ciphers server-openssl11.ciphers >client-openssl11-server-openssl11.ciphers.tmp uniq -d client-openssl11-server-openssl11.ciphers # we are only interested in ciphers supported by libressl sort client-openssl11-server-openssl11.ciphers client-libressl.ciphers >client-openssl11-server-openssl11.ciphers.tmp # OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers sed -i '/^TLS_/d' client-openssl11-server-openssl11.ciphers.tmp uniq -d client-openssl11-server-openssl11.ciphers rm client-openssl11-server-openssl11.ciphers.tmp # get ciphers shared between client and server sort client-openssl11.ciphers server-openssl32.ciphers >client-openssl11-server-openssl32.ciphers.tmp uniq -d client-openssl11-server-openssl32.ciphers # we are only interested in ciphers supported by libressl sort client-openssl11-server-openssl32.ciphers client-libressl.ciphers >client-openssl11-server-openssl32.ciphers.tmp # OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers sed -i '/^TLS_/d' client-openssl11-server-openssl32.ciphers.tmp uniq -d client-openssl11-server-openssl32.ciphers rm client-openssl11-server-openssl32.ciphers.tmp LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client -l ALL -L >client-openssl32.ciphers.tmp sed -n 's/^cipher //p' client-openssl32.ciphers rm client-openssl32.ciphers.tmp # get ciphers shared between client and server sort client-openssl32.ciphers server-libressl.ciphers >client-openssl32-server-libressl.ciphers.tmp uniq -d client-openssl32-server-libressl.ciphers # we are only interested in ciphers supported by libressl sort client-openssl32-server-libressl.ciphers client-libressl.ciphers >client-openssl32-server-libressl.ciphers.tmp # OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers sed -i '/^TLS_/d' client-openssl32-server-libressl.ciphers.tmp uniq -d client-openssl32-server-libressl.ciphers rm client-openssl32-server-libressl.ciphers.tmp # get ciphers shared between client and server sort client-openssl32.ciphers server-openssl11.ciphers >client-openssl32-server-openssl11.ciphers.tmp uniq -d client-openssl32-server-openssl11.ciphers # we are only interested in ciphers supported by libressl sort client-openssl32-server-openssl11.ciphers client-libressl.ciphers >client-openssl32-server-openssl11.ciphers.tmp # OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers sed -i '/^TLS_/d' client-openssl32-server-openssl11.ciphers.tmp uniq -d client-openssl32-server-openssl11.ciphers rm client-openssl32-server-openssl11.ciphers.tmp # get ciphers shared between client and server sort client-openssl32.ciphers server-openssl32.ciphers >client-openssl32-server-openssl32.ciphers.tmp uniq -d client-openssl32-server-openssl32.ciphers # we are only interested in ciphers supported by libressl sort client-openssl32-server-openssl32.ciphers client-libressl.ciphers >client-openssl32-server-openssl32.ciphers.tmp # OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers sed -i '/^TLS_/d' client-openssl32-server-openssl32.ciphers.tmp uniq -d client-openssl32-server-openssl32.ciphers rm client-openssl32-server-openssl32.ciphers.tmp rm -f ciphers.mk ciphers.mk.tmp echo 'CIPHERS_libressl_libressl =' >>ciphers.mk.tmp `cat client-libressl-server-libressl.ciphers` echo 'CIPHERS_libressl_openssl11 =' >>ciphers.mk.tmp `cat client-libressl-server-openssl11.ciphers` echo 'CIPHERS_libressl_openssl32 =' >>ciphers.mk.tmp `cat client-libressl-server-openssl32.ciphers` echo 'CIPHERS_openssl11_libressl =' >>ciphers.mk.tmp `cat client-openssl11-server-libressl.ciphers` echo 'CIPHERS_openssl11_openssl11 =' >>ciphers.mk.tmp `cat client-openssl11-server-openssl11.ciphers` echo 'CIPHERS_openssl11_openssl32 =' >>ciphers.mk.tmp `cat client-openssl11-server-openssl32.ciphers` echo 'CIPHERS_openssl32_libressl =' >>ciphers.mk.tmp `cat client-openssl32-server-libressl.ciphers` echo 'CIPHERS_openssl32_openssl11 =' >>ciphers.mk.tmp `cat client-openssl32-server-openssl11.ciphers` echo 'CIPHERS_openssl32_openssl32 =' >>ciphers.mk.tmp `cat client-openssl32-server-openssl32.ciphers` mv ciphers.mk.tmp ciphers.mk ==== run-cipher-AES128-GCM-SHA256-client-libressl-server-libressl ==== openssl dhparam -out dh.param 1024 Generating DH parameters, 1024 bit long safe prime, generator 2 This is going to take a long time ......................................................................................................................................................................................* LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out -l AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== check-cipher-AES128-GCM-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== run-cipher-AES128-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-SHA-client-libressl-server-libressl.out -l AES128-SHA `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AES128-SHA-client-libressl-server-libressl.out ==== check-cipher-AES128-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-SHA-client-libressl-server-libressl.out ==== run-cipher-AES128-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-SHA256-client-libressl-server-libressl.out -l AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-libressl-server-libressl.out ==== check-cipher-AES128-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-SHA256-client-libressl-server-libressl.out ==== run-cipher-AES256-GCM-SHA384-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out -l AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== check-cipher-AES256-GCM-SHA384-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== run-cipher-AES256-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-SHA-client-libressl-server-libressl.out -l AES256-SHA `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AES256-SHA-client-libressl-server-libressl.out ==== check-cipher-AES256-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-SHA-client-libressl-server-libressl.out ==== run-cipher-AES256-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-SHA256-client-libressl-server-libressl.out -l AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-libressl-server-libressl.out ==== check-cipher-AES256-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-SHA256-client-libressl-server-libressl.out ==== run-cipher-CAMELLIA128-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out -l CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out ==== check-cipher-CAMELLIA128-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out ==== run-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out -l CAMELLIA128-SHA256 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out ==== check-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out ==== run-cipher-CAMELLIA256-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out -l CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out ==== check-cipher-CAMELLIA256-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out ==== run-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out -l CAMELLIA256-SHA256 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out ==== check-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out ==== run-cipher-DES-CBC3-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out -l DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out ==== check-cipher-DES-CBC3-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out -l DHE-RSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out -l DHE-RSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out -l DHE-RSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out -l DHE-RSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out -l DHE-RSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out -l DHE-RSA-AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out -l DHE-RSA-CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out -l DHE-RSA-CAMELLIA128-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out -l DHE-RSA-CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out -l DHE-RSA-CAMELLIA256-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out -l DHE-RSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out -l ECDHE-ECDSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out -l ECDHE-ECDSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out -l ECDHE-ECDSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out -l ECDHE-ECDSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out -l ECDHE-ECDSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out -l ECDHE-ECDSA-AES256-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out -l ECDHE-ECDSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out -l ECDHE-ECDSA-DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-RC4-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out -l ECDHE-ECDSA-RC4-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out -l ECDHE-RSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out -l ECDHE-RSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out -l ECDHE-RSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out -l ECDHE-RSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out -l ECDHE-RSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out -l ECDHE-RSA-AES256-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out -l ECDHE-RSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out -l ECDHE-RSA-DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-RC4-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out -l ECDHE-RSA-RC4-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out ==== run-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l EDH-RSA-DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out -l EDH-RSA-DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out ==== check-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out ==== run-cipher-RC4-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-RC4-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l RC4-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-RC4-SHA-client-libressl-server-libressl.out -l RC4-SHA `sed -n 's/listen sock: //p' server-cipher-RC4-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-RC4-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-RC4-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-RC4-SHA-client-libressl-server-libressl.out ==== check-cipher-RC4-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-RC4-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-RC4-SHA-client-libressl-server-libressl.out ==== run-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l TLS_AES_128_GCM_SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out -l TLS_AES_128_GCM_SHA256 `sed -n 's/listen sock: //p' server-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out ==== check-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl ==== grep -q ' Cipher *: TLS_AES_128_GCM_SHA256$' client-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out grep -q ' Cipher *: TLS_AES_128_GCM_SHA256$' server-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out ==== run-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l TLS_AES_256_GCM_SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out -l TLS_AES_256_GCM_SHA384 `sed -n 's/listen sock: //p' server-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out ==== check-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl ==== grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out ==== run-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l TLS_CHACHA20_POLY1305_SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out -l TLS_CHACHA20_POLY1305_SHA256 `sed -n 's/listen sock: //p' server-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out ==== check-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl ==== grep -q ' Cipher *: TLS_CHACHA20_POLY1305_SHA256$' client-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out grep -q ' Cipher *: TLS_CHACHA20_POLY1305_SHA256$' server-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out ==== run-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out -l AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== check-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== run-cipher-AES128-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES128-SHA-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-SHA-client-libressl-server-openssl11.out -l AES128-SHA `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-AES128-SHA-client-libressl-server-openssl11.out ==== check-cipher-AES128-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-SHA-client-libressl-server-openssl11.out ==== run-cipher-AES128-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES128-SHA256-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-SHA256-client-libressl-server-openssl11.out -l AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-libressl-server-openssl11.out ==== check-cipher-AES128-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-SHA256-client-libressl-server-openssl11.out ==== run-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out -l AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== check-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== run-cipher-AES256-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES256-SHA-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-SHA-client-libressl-server-openssl11.out -l AES256-SHA `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-AES256-SHA-client-libressl-server-openssl11.out ==== check-cipher-AES256-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-SHA-client-libressl-server-openssl11.out ==== run-cipher-AES256-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES256-SHA256-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-SHA256-client-libressl-server-openssl11.out -l AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-libressl-server-openssl11.out ==== check-cipher-AES256-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-SHA256-client-libressl-server-openssl11.out ==== run-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out -l CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out ==== check-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out ==== run-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out -l CAMELLIA128-SHA256 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out ==== check-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out ==== run-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out -l CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out ==== check-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out ==== run-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out -l CAMELLIA256-SHA256 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out ==== check-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out -l DHE-RSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out -l DHE-RSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out -l DHE-RSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out -l DHE-RSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out -l DHE-RSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out -l DHE-RSA-AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out -l DHE-RSA-CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out -l DHE-RSA-CAMELLIA128-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out -l DHE-RSA-CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out -l DHE-RSA-CAMELLIA256-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out -l DHE-RSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out -l ECDHE-ECDSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out -l ECDHE-ECDSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out -l ECDHE-ECDSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out -l ECDHE-ECDSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out -l ECDHE-ECDSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out -l ECDHE-ECDSA-AES256-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out -l ECDHE-ECDSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out -l ECDHE-RSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out -l ECDHE-RSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out -l ECDHE-RSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out -l ECDHE-RSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out -l ECDHE-RSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out -l ECDHE-RSA-AES256-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out -l ECDHE-RSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out ==== run-cipher-AES128-GCM-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl32.out -l AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl32.out ==== check-cipher-AES128-GCM-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl32.out ==== run-cipher-AES128-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES128-SHA-client-libressl-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-SHA-client-libressl-server-openssl32.out -l AES128-SHA `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-AES128-SHA-client-libressl-server-openssl32.out ==== check-cipher-AES128-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-SHA-client-libressl-server-openssl32.out ==== run-cipher-AES128-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES128-SHA256-client-libressl-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-SHA256-client-libressl-server-openssl32.out -l AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-libressl-server-openssl32.out ==== check-cipher-AES128-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-SHA256-client-libressl-server-openssl32.out ==== run-cipher-AES256-GCM-SHA384-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl32.out -l AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl32.out ==== check-cipher-AES256-GCM-SHA384-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl32.out ==== run-cipher-AES256-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES256-SHA-client-libressl-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-SHA-client-libressl-server-openssl32.out -l AES256-SHA `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-AES256-SHA-client-libressl-server-openssl32.out ==== check-cipher-AES256-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-SHA-client-libressl-server-openssl32.out ==== run-cipher-AES256-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES256-SHA256-client-libressl-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-SHA256-client-libressl-server-openssl32.out -l AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-libressl-server-openssl32.out ==== check-cipher-AES256-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-SHA256-client-libressl-server-openssl32.out ==== run-cipher-CAMELLIA128-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl32.out -l CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl32.out ==== check-cipher-CAMELLIA128-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl32.out ==== run-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl32.out -l CAMELLIA128-SHA256 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl32.out ==== check-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl32.out ==== run-cipher-CAMELLIA256-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl32.out -l CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl32.out ==== check-cipher-CAMELLIA256-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl32.out ==== run-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl32.out -l CAMELLIA256-SHA256 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl32.out ==== check-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl32.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out -l DHE-RSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out ==== run-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl32.out -l DHE-RSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl32.out ==== check-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl32.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out -l DHE-RSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out -l DHE-RSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out ==== run-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl32.out -l DHE-RSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl32.out ==== check-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl32.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl32.out -l DHE-RSA-AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl32.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl32.out -l DHE-RSA-CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl32.out -l DHE-RSA-CAMELLIA128-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl32.out -l DHE-RSA-CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl32.out -l DHE-RSA-CAMELLIA256-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl32.out ==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out -l DHE-RSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out ==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out -l ECDHE-ECDSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl32.out -l ECDHE-ECDSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl32.out -l ECDHE-ECDSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out -l ECDHE-ECDSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl32.out -l ECDHE-ECDSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl32.out -l ECDHE-ECDSA-AES256-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out -l ECDHE-ECDSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out -l ECDHE-RSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl32.out -l ECDHE-RSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out -l ECDHE-RSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out -l ECDHE-RSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl32.out -l ECDHE-RSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl32.out -l ECDHE-RSA-AES256-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out -l ECDHE-RSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out ==== run-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out -l AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== check-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== run-cipher-AES128-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-SHA-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES128-SHA-client-openssl11-server-libressl.out -l AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-AES128-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-AES128-SHA-client-openssl11-server-libressl.out ==== check-cipher-AES128-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA-client-openssl11-server-libressl.out ==== run-cipher-AES128-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-SHA256-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES128-SHA256-client-openssl11-server-libressl.out -l AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-AES128-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-openssl11-server-libressl.out ==== check-cipher-AES128-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA256-client-openssl11-server-libressl.out ==== run-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out -l AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== check-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== run-cipher-AES256-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-SHA-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES256-SHA-client-openssl11-server-libressl.out -l AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-AES256-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-AES256-SHA-client-openssl11-server-libressl.out ==== check-cipher-AES256-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA-client-openssl11-server-libressl.out ==== run-cipher-AES256-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-SHA256-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES256-SHA256-client-openssl11-server-libressl.out -l AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-AES256-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-openssl11-server-libressl.out ==== check-cipher-AES256-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA256-client-openssl11-server-libressl.out ==== run-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out -l CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out ==== check-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out ==== run-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out -l CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out ==== check-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out ==== run-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out -l CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out ==== check-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out ==== run-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out -l CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out ==== check-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out -l DHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out -l DHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out ==== run-cipher-AES128-GCM-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-GCM-SHA256-client-openssl32-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES128-GCM-SHA256-client-openssl32-server-libressl.out -l AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-openssl32-server-libressl.out ==== check-cipher-AES128-GCM-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-GCM-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-GCM-SHA256-client-openssl32-server-libressl.out ==== run-cipher-AES128-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-SHA-client-openssl32-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES128-SHA-client-openssl32-server-libressl.out -l AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-AES128-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-AES128-SHA-client-openssl32-server-libressl.out ==== check-cipher-AES128-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA-client-openssl32-server-libressl.out ==== run-cipher-AES128-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-SHA256-client-openssl32-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES128-SHA256-client-openssl32-server-libressl.out -l AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-AES128-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-openssl32-server-libressl.out ==== check-cipher-AES128-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA256-client-openssl32-server-libressl.out ==== run-cipher-AES256-GCM-SHA384-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-GCM-SHA384-client-openssl32-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES256-GCM-SHA384-client-openssl32-server-libressl.out -l AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-openssl32-server-libressl.out ==== check-cipher-AES256-GCM-SHA384-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-GCM-SHA384-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-GCM-SHA384-client-openssl32-server-libressl.out ==== run-cipher-AES256-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-SHA-client-openssl32-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES256-SHA-client-openssl32-server-libressl.out -l AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-AES256-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-AES256-SHA-client-openssl32-server-libressl.out ==== check-cipher-AES256-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA-client-openssl32-server-libressl.out ==== run-cipher-AES256-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-SHA256-client-openssl32-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES256-SHA256-client-openssl32-server-libressl.out -l AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-AES256-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-openssl32-server-libressl.out ==== check-cipher-AES256-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA256-client-openssl32-server-libressl.out ==== run-cipher-CAMELLIA128-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA128-SHA-client-openssl32-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA128-SHA-client-openssl32-server-libressl.out -l CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-openssl32-server-libressl.out ==== check-cipher-CAMELLIA128-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA-client-openssl32-server-libressl.out ==== run-cipher-CAMELLIA128-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA128-SHA256-client-openssl32-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA128-SHA256-client-openssl32-server-libressl.out -l CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-openssl32-server-libressl.out ==== check-cipher-CAMELLIA128-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-libressl.out ==== run-cipher-CAMELLIA256-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA256-SHA-client-openssl32-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA256-SHA-client-openssl32-server-libressl.out -l CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-openssl32-server-libressl.out ==== check-cipher-CAMELLIA256-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA-client-openssl32-server-libressl.out ==== run-cipher-CAMELLIA256-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA256-SHA256-client-openssl32-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA256-SHA256-client-openssl32-server-libressl.out -l CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-openssl32-server-libressl.out ==== check-cipher-CAMELLIA256-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-libressl.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out ==== run-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-libressl.out -l DHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-libressl.out ==== check-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-libressl.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out ==== run-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-libressl.out -l DHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-libressl.out ==== check-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-libressl.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-libressl.out -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-libressl.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-libressl.out -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-libressl.out -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-libressl.out -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-libressl.out -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-libressl.out ==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out ==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-libressl.out -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-libressl.out -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-libressl.out -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-libressl.out -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-libressl.out -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-libressl.out -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-libressl.out -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out ==== run-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out -l AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-AES128-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES128-SHA-client-openssl11-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES128-SHA-client-openssl11-server-openssl11.out -l AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-AES128-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-AES128-SHA-client-openssl11-server-openssl11.out ==== check-cipher-AES128-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA-client-openssl11-server-openssl11.out ==== run-cipher-AES128-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES128-SHA256-client-openssl11-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES128-SHA256-client-openssl11-server-openssl11.out -l AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-AES128-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-AES128-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out -l AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out ==== check-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out ==== run-cipher-AES256-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES256-SHA-client-openssl11-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES256-SHA-client-openssl11-server-openssl11.out -l AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-AES256-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-AES256-SHA-client-openssl11-server-openssl11.out ==== check-cipher-AES256-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA-client-openssl11-server-openssl11.out ==== run-cipher-AES256-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES256-SHA256-client-openssl11-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES256-SHA256-client-openssl11-server-openssl11.out -l AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-AES256-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-AES256-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out -l CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out ==== check-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out ==== run-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out -l CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out -l CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out ==== check-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out ==== run-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out -l CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out -l DHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out ==== check-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out ==== run-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out -l DHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out ==== check-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out ==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out ==== run-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl32.out -l AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-AES128-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES128-SHA-client-openssl11-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES128-SHA-client-openssl11-server-openssl32.out -l AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-AES128-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-AES128-SHA-client-openssl11-server-openssl32.out ==== check-cipher-AES128-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA-client-openssl11-server-openssl32.out ==== run-cipher-AES128-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES128-SHA256-client-openssl11-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES128-SHA256-client-openssl11-server-openssl32.out -l AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-AES128-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-AES128-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl32.out -l AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl32.out ==== check-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl32.out ==== run-cipher-AES256-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES256-SHA-client-openssl11-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES256-SHA-client-openssl11-server-openssl32.out -l AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-AES256-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-AES256-SHA-client-openssl11-server-openssl32.out ==== check-cipher-AES256-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA-client-openssl11-server-openssl32.out ==== run-cipher-AES256-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES256-SHA256-client-openssl11-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES256-SHA256-client-openssl11-server-openssl32.out -l AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-AES256-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-AES256-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl32.out -l CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl32.out ==== check-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl32.out ==== run-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out -l CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl32.out -l CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl32.out ==== check-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl32.out ==== run-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out -l CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out -l DHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out ==== check-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out ==== run-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out -l DHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out ==== check-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl32.out -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl32.out -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl32.out -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out ==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl32.out -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl32.out -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl32.out -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl32.out -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl32.out -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out ==== run-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl11.out -l AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-AES128-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES128-SHA-client-openssl32-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES128-SHA-client-openssl32-server-openssl11.out -l AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-AES128-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-AES128-SHA-client-openssl32-server-openssl11.out ==== check-cipher-AES128-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA-client-openssl32-server-openssl11.out ==== run-cipher-AES128-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES128-SHA256-client-openssl32-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES128-SHA256-client-openssl32-server-openssl11.out -l AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-AES128-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-AES128-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl11.out -l AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl11.out ==== check-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl11.out ==== run-cipher-AES256-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES256-SHA-client-openssl32-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES256-SHA-client-openssl32-server-openssl11.out -l AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-AES256-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-AES256-SHA-client-openssl32-server-openssl11.out ==== check-cipher-AES256-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA-client-openssl32-server-openssl11.out ==== run-cipher-AES256-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES256-SHA256-client-openssl32-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES256-SHA256-client-openssl32-server-openssl11.out -l AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-AES256-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-AES256-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl11.out -l CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl11.out ==== check-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl11.out ==== run-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out -l CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl11.out -l CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl11.out ==== check-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl11.out ==== run-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out -l CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out -l DHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out ==== check-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out ==== run-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out -l DHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out ==== check-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl11.out -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl11.out -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl11.out -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out ==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl11.out -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl11.out -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl11.out -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl11.out -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl11.out -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out ==== run-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl32.out -l AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-AES128-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES128-SHA-client-openssl32-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES128-SHA-client-openssl32-server-openssl32.out -l AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-AES128-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-AES128-SHA-client-openssl32-server-openssl32.out ==== check-cipher-AES128-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA-client-openssl32-server-openssl32.out ==== run-cipher-AES128-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES128-SHA256-client-openssl32-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES128-SHA256-client-openssl32-server-openssl32.out -l AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-AES128-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-AES128-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl32.out -l AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl32.out ==== check-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl32.out ==== run-cipher-AES256-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES256-SHA-client-openssl32-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES256-SHA-client-openssl32-server-openssl32.out -l AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-AES256-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-AES256-SHA-client-openssl32-server-openssl32.out ==== check-cipher-AES256-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA-client-openssl32-server-openssl32.out ==== run-cipher-AES256-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES256-SHA256-client-openssl32-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES256-SHA256-client-openssl32-server-openssl32.out -l AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-AES256-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-AES256-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl32.out -l CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl32.out ==== check-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl32.out ==== run-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out -l CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl32.out -l CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl32.out ==== check-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl32.out ==== run-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out -l CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out -l DHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out ==== check-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out ==== run-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out -l DHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out ==== check-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl32.out -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl32.out -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl32.out -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out ==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl32.out -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl32.out -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl32.out -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl32.out -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl32.out -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out ===> cert ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify ==== openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key ................................ ................. writing new private key to '127.0.0.1.key' ----- openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=ca/CN=root/ -nodes -newkey rsa -keyout ca.key -x509 -out ca.crt Generating a 2048 bit RSA private key ................................................ ... writing new private key to 'ca.key' ----- openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=ca/CN=root/ -nodes -newkey rsa -keyout fake-ca.key -x509 -out fake-ca.crt Generating a 2048 bit RSA private key ........................................................................................... ......................... writing new private key to 'fake-ca.key' ----- openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=client/CN=localhost/ -nodes -newkey rsa -keyout client.key -out client.req Generating a 2048 bit RSA private key ......................................................................................... ................... writing new private key to 'client.key' ----- openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt -req -in client.req -out client.crt Signature ok subject=/L=OpenBSD/O=tls-regress/OU=client/CN=localhost openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=localhost/ -nodes -newkey rsa -keyout server.key -out server.req Generating a 2048 bit RSA private key .................. ..... writing new private key to 'server.key' ----- openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt -req -in server.req -out server.crt Signature ok subject=/L=OpenBSD/O=tls-regress/OU=server/CN=localhost LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 1735245297576:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 6062065366952:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 15875988826024:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 12600960395176:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 6927284295592:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 4691038611368:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out` 3012488320936:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out 15822642710440:error:1403F418:SSL routines:ACCEPT_SR_FINISHED:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 server: SSL_accept -1 client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out` 5223223179176:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out` 12042450433960:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 14821002676136:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out` 14485939517352:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out` 2111993919400:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-verify.out` 13537501140904:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 15216584558504:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out` 10194008180648:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out` 7398258235304:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out` 209045448616:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 13249750935464:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-certverify.out` 16093635315624:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 6024547477416:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 1462619375528:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 16846186370984:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-certverify.out` 7350602356648:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-certverify.out` 9382395922344:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out` 7315954329512:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out` 6028368807848:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-noverify.out` 15100428310440:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 7495543830440:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out` 8795450853288:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out` 6865409574824:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-verify.out` 6443365939112:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 5796838123432:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-certverify.out` 897914124200:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-certverify.out` 11124902926248:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-certverify.out` 13601217415080:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 2949648975784:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out` 3921568376744:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 4204056463272:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 1045806430120:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 7375913772968:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-verify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 6898831550376:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out` 10250285860776:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 2411925243816:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 679771543464:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 14680732211112:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-certverify.out` 12740789086120:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out` 3787707901864:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out` 6505352722344:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-noverify.out` 16991153137576:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 1095918045096:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out` 2741751166888:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out` 8351856670632:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-verify.out` 16617627621288:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 2392633321384:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out` 7015612352424:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out` 5082847606696:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-certverify.out` 17106731894696:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 8324847523752:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out` 51461322664:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 932641142696:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 14579536353192:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-verify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 15383460210600:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out` 6486064449448:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 11444660561832:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 586560075688:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out` 3080097683368:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-certverify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 14149068597160:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out` 1891344844712:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out` 3787179038632:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-noverify.out` 6382712428456:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 1275341006760:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out` 17428092290984:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out` 9943137937320:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-verify.out` 10060542859176:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 5472434161576:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-verify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out` 10933448226728:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out` 15382785931176:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-certverify.out` 13867208439720:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 16314595555240:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 8334026839976:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 5043160864680:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 5866668910504:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 52572460968:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 9331265046440:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 6758858422184:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out` 5170625886120:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out` 14493973989288:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out` 15767103862696:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 2802448197544:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out` 12977100322728:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out` 3011170035624:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-verify.out` 13800570656680:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 2406849750952:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out` 7407881893800:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out 167547987880:error:14039418:SSL routines:ACCEPT_SR_CERT_VRFY:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 server: SSL_accept -1 client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out` 318271371176:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out` 16076861208488:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 7639079876520:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-certverify.out` 3100489967528:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 4632234899368:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 16829263533992:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 1829613340584:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-certverify.out` 3013967058856:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-certverify.out` 7750500128680:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out` 8116266166184:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out` 11800570910632:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-noverify.out` 1456818001832:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 15079124703144:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 16343823624104:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out` 283630176168:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out` 5959834335144:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-verify.out` 4299634628520:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 1372358412200:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 2632212645800:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-certverify.out` 13978133075880:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-certverify.out` 10819576420264:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-certverify.out` 14573785495464:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 9094903408552:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 8783328880552:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-certverify.out success ==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out` 17392788064168:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out` 7072603150248:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-noverify.out` 8737961568168:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 12500193007528:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out` 12540832847784:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out` 5456119089064:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-verify.out` 14171629463464:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 10108057270184:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out` 16975437674408:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out` 947493984168:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-certverify.out` 7291648735144:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 5022751954856:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out` 13775418853288:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out 6316797343656:error:1403F418:SSL routines:ACCEPT_SR_FINISHED:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 server: SSL_accept -1 client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out` 5475006396328:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-noverify.out` 928692651944:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 11568432187304:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 1811519608744:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out` 4873072502696:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out` 13875920107432:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-verify.out` 11477449303976:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 6405953468328:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 6257334671272:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-verify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out` 17176401840040:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out` 1936257845160:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-certverify.out` 4890112604072:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 13949969422248:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 4915985344424:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out` 7175882495912:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 16603471349672:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 4652592879528:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 10347869595560:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out` 2981216688040:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out` 9664389199784:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out` 12821953038248:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out` 17173238011816:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out` 17540868908968:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 5824131065768:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out` 2560813217704:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out` 13956409997224:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out` 14515949606824:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 14453342345128:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out` 9584981313448:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out` 14581785638824:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out` 7531033016232:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 2791448623016:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out` 13414434142120:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 11112825288616:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 11133618030504:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 11867036129192:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out` 10820695918504:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out` 14980279711656:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out` 16765691877288:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16765691877288:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16765691877288:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16765691877288:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out` 2203566602152:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 2203566602152:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 2203566602152:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 2203566602152:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out` 6757973063592:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 6757973063592:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 6757973063592:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 6757973063592:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 11415469668264:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 11928000059304:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out` 9005438216104:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 9005438216104:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 9005438216104:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 9005438216104:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out` 33309312936:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 33309312936:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 33309312936:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 33309312936:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out` 2308174575528:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 2308174575528:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 2308174575528:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 2308174575528:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 2800420771752:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 11050452166568:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out` 8175063349160:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 8175063349160:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 8175063349160:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 8175063349160:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out` 2593934546856:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 2593934546856:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 2593934546856:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 2593934546856:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-certverify.out` 4222981666728:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 4222981666728:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 4222981666728:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 4222981666728:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 17143551879080:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 13513085306792:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out` 1208393758632:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 1208393758632:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 1208393758632:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 1208393758632:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 2244145747880:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 3989066393512:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 7097554601896:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 7097554601896:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7097554601896:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7097554601896:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out` 4132622649256:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 4132622649256:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 4132622649256:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: client: SSL_read 0 4132622649256:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out` 2100345231272:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 2100345231272:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 2100345231272:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 2100345231272:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 7757508736936:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 15991148914600:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 8825616111528:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 8825616111528:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 8825616111528:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 8825616111528:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out` 17341463574440:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 17341463574440:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 17341463574440:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 17341463574440:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out` 11178771474344:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out` 923809507240:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out` 6304640837544:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 13640195991464:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out` 3756857399208:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out` 4919223158696:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out` 9432251549608:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 8524210608040:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out` 8844798453672:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out 3227170228136:error:14039418:SSL routines:ACCEPT_SR_CERT_VRFY:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 server: SSL_accept -1 client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out` 10365009176488:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out` 3115390994344:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 11645207672744:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out` 535602509736:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 535602509736:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 535602509736:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 535602509736:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 9543838222248:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 014652010522536:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 14652010522536:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 14652010522536:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 14652010522536:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 1628191291304:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: SSL_read 0 1628191291304:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 1628191291304:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 1628191291304:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out` 6840083453864:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 6840083453864:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 6840083453864:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 6840083453864:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 2905398511528:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 17512508327848:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 3983365683112:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 3983365683112:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 3983365683112:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: client: SSL_read 0 3983365683112:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 201116522408:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: SSL_read 0 201116522408:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 201116522408:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 201116522408:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out` 11500989749160:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 11500989749160:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 11500989749160:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11500989749160:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out` 699340351400:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 699340351400:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 699340351400:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 699340351400:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out` 10827769092008:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 10827769092008:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 10827769092008:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10827769092008:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 11886194223016:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 12364750075816:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out` 13369215698856:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 13369215698856:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 13369215698856:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 13369215698856:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out` 1855194232744:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 1855194232744:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 1855194232744:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 1855194232744:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-verify.out` 1839951247272:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 1839951247272:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 1839951247272:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 1839951247272:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 10858557933480:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 10265307887528:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out` 17388402354088:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 17388402354088:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 17388402354088:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 17388402354088:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out` 17602135930792:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 17602135930792:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 17602135930792:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 17602135930792:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out` 16426062993320:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16426062993320:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16426062993320:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16426062993320:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 1338556729256:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 16783183636392:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 6851242055592:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 9035381725096:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 17165999736744:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 13295964182440:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 14212373465000:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 746239571880:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out` 9656311601064:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out` 8541262321576:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out` 6329242290088:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 10366514255784:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out` 14108724098984:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out` 3088328320936:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-verify.out` 8222299752360:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 11755953493928:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out` 4998868002728:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out` 15267142154152:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out` 11638172702632:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 15757559396264:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-certverify.out` 201281578920:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 11127626807208:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 16079526692776:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 9577511077800:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-certverify.out` 13506617120680:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-certverify.out` 9625772394408:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-certverify.out` 13274991630248:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 11225618618280:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 1357337098152:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 14036562556840:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-certverify.out` 14910882826152:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-certverify.out` 16377354827688:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out` 11155871283112:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 11354667550632:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-verify.out client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out` 11247164311464:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-verify.out` 4406023051176:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out` 3185037866920:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 11001655871400:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 16792654096296:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-certverify.out` 1354987366312:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out` 2053637957544:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out 7473147041704:error:1403F418:SSL routines:ACCEPT_SR_FINISHED:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 server: SSL_accept -1 client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out` 10169696962472:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-noverify.out` 8362791577512:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 10469332973480:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out` 13921053521832:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out` 16924942944168:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-verify.out` 5205707671464:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 15065632761768:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out` 6181977491368:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out` 14063604787112:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-certverify.out` 869043320744:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 11693827520424:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out` 17105166882728:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 7545532725160:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 1486283790248:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out` 9216540333992:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-verify.out` 10733453711272:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out` 16847714850728:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 4775865005992:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 1509524297640:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 11809897166760:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-certverify.out` 14078281447336:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out` 4604474050472:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 9491445307304:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 010476594223016:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-verify.out` 15419028264872:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out` 7287745099688:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 4414165731240:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 3106456811432:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out` 2134550374312:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-certverify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 7395421009832:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 8296279353256:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 4463525910440:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 13083632658344:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 11067908700072:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 1922001631144:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 4415005444008:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out` 11486500251560:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out` 3475237283752:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out` 13384504346536:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 15826431322024:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out` 13225384339368:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out` 10975276636072:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-verify.out` 13773009680296:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 13326163691432:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out` 7549257471912:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out` 10508697941928:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out` 9340495026088:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 1338122278824:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-certverify.out` 4488539219880:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 2791256811432:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 15994742667176:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 15738717403048:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-certverify.out` 12786103752616:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-certverify.out` 15882331891624:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-certverify.out` 13306463078312:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 7451797673896:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 10122213926824:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 17059401344936:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-certverify.out` 9332163454888:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-certverify.out` 16360197457832:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-certverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-certverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-certverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-certverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-noverify.out` 15396933277608:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-noverify.out 8762603665320:error:1403F418:SSL routines:ACCEPT_SR_FINISHED:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 server: SSL_accept -1 client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-noverify.out` 14876656678824:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-noverify.out` 8330199730088:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 15417806182312:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-verify.out` 5577193781160:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-verify.out client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-verify.out` 8410406188968:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-verify.out` 12130721236904:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 8413588559784:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-certverify.out` 8314426705832:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-certverify.out 6509241972648:error:14039418:SSL routines:ACCEPT_SR_CERT_VRFY:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 server: SSL_accept -1 client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-certverify.out` 9249289062312:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-certverify.out` 11263345616808:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 8775078561704:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out` 5098126919592:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 1326532515752:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 8597965801384:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 17433439971240:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out` 16239374264232:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out` 17435048667048:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out` 7180089259944:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out` 9966378129320:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out` 6614138763176:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 16118460368808:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out` 2847065679784:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out 11432271407016:error:14039418:SSL routines:ACCEPT_SR_CERT_VRFY:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 server: SSL_accept -1 client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out` 13958451484584:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out` 13348327430056:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 6075844777896:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out` 9090924885928:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out` 14023221188520:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out` 3217042757544:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 17359800850344:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out` 1983148664744:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 5404267980712:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 14649633302440:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 17418937722792:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out` 7372592007080:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out` 16611330443176:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out` 10951627495336:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 2418832156584:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 10181526443944:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 2997656557480:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out` 14915710244776:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out` 14094024488872:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out` 10058162739112:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 10058162739112:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 10058162739112:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10058162739112:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 16294992447400:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 12765201442728:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 13980400752552:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 13980400752552:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: client: SSL_read 0 13980400752552:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 13980400752552:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 13980400752552:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 13980400752552:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 13980400752552:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out` 12958240110504:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 12958240110504:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 12958240110504:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 12958240110504:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 12958240110504:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: client: SSL_read 012958240110504:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 12958240110504:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out` 3477369092008:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 3477369092008:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 3477369092008:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 3477369092008:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 946355996584:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 15127117453224:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 16783937857448:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: SSL_read 0 16783937857448:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16783937857448:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16783937857448:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16783937857448:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16783937857448:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16783937857448:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out` 11413026875304:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 11413026875304:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: client: SSL_read 0 11413026875304:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11413026875304:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 11413026875304:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 11413026875304:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11413026875304:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out` 5490416248744:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out` 5980657026984:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out` 2544531277736:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 7898638112680:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-verify.out` 11244153042856:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out` 15659180492712:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out` 16339920418728:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 1085994125224:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out` 599273043880:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out` 13895931738024:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out` 12578883090344:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 3865092749224:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out` 2827300472744:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 2827300472744:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 2827300472744:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 2827300472744:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 4054031652776:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 3600904845224:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 3137977317288:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 3137977317288:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 3137977317288:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 3137977317288:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: 3137977317288:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: SSL_read 0 3137977317288:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 3137977317288:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 9138847279016:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 9138847279016:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: client: SSL_read 09138847279016:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 9138847279016:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 9138847279016:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 9138847279016:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 9138847279016:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out` 14221030270888:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 14221030270888:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 14221030270888:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 14221030270888:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 16623839340456:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 3995352823720:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 011246634084264:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 11246634084264:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 11246634084264:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11246634084264:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 11246634084264:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 11246634084264:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11246634084264:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 13019466581928:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: SSL_read 0 13019466581928:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 13019466581928:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 13019466581928:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 13019466581928:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 13019466581928:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 13019466581928:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out` 6250665015208:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 6250665015208:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 6250665015208:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 6250665015208:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 16626220259240:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 9359503763368:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 2451921749928:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 2451921749928:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 2451921749928:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 2451921749928:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 2451921749928:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 2451921749928:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 2451921749928:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 5156579428264:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 5156579428264:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: client: SSL_read 0 5156579428264:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 5156579428264:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 5156579428264:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 5156579428264:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 5156579428264:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out` 11731009038248:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 11731009038248:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 11731009038248:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11731009038248:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 14474047154088:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 2535407855528:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 14181313886120:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 14181313886120:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 14181313886120:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 14181313886120:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 14181313886120:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 14181313886120:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 14181313886120:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 17541206824872:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: SSL_read 0 17541206824872:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 17541206824872:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 17541206824872:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 17541206824872:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 17541206824872:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 17541206824872:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 7242869122984:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 233596082088:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 11065074415528:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 6080670103464:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 7303171360680:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 17097674266536:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out` 2009747441576:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out` 3188214794152:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out` 15584735061928:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 10578415257512:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out` 9707005523880:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out` 16769877768104:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out` 9955331512232:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 16486022035368:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out` 13460268771240:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out` 13576107481000:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out` 3262743332776:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 14807257356200:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out` 2294094387112:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 10678970591144:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 5010437814184:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 9442855880616:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out` 9657582307240:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out` 15869973583784:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out` 15567328708520:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 15567328708520:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 15567328708520:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 15567328708520:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out` 1785376659368:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 1785376659368:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 1785376659368:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 1785376659368:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out` 13459181066152:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 13459181066152:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 13459181066152:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 13459181066152:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 8689149274024:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 2782447069096:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out` 17383075178408:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 17383075178408:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 17383075178408:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 17383075178408:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out` 205081933736:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 205081933736:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 205081933736:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 205081933736:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out` 9809825503144:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 9809825503144:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 9809825503144:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 9809825503144:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 5694005532584:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 13161287518120:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out` 8663339947944:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 8663339947944:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 8663339947944:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 8663339947944:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out` 7536775518120:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 7536775518120:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7536775518120:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7536775518120:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-certverify.out` 11718572033960:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 11718572033960:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 11718572033960:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11718572033960:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 4997201672104:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 4169061328808:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out` 1293033183144:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 9770176804776:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 2970485127080:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 8415311501224:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 8415311501224:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 8415311501224:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 8415311501224:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 16608991053736:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16608991053736:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: client: SSL_read 0 16608991053736:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16608991053736:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out` 5301874595752:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 11483365287848:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 16945602230184:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 16537749899176:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: SSL_read 0 16537749899176:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16537749899176:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16537749899176:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 10920427177896:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: SSL_read 0 10920427177896:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 10920427177896:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10920427177896:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out` 11656629147560:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out` 10190440650664:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out` 15890532853672:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 16155197233064:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-verify.out` 7303946307496:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-verify.out 10226226296744:error:14039418:SSL routines:ACCEPT_SR_CERT_VRFY:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 server: SSL_accept -1 client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out` 3145151735720:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out` 7505067161512:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 2459752785832:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out` 6555815651240:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out 15657558362024:error:14039418:SSL routines:ACCEPT_SR_CERT_VRFY:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 server: SSL_accept -1 client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out` 2220455536552:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out` 9853053826984:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 15565954906024:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out` 5542513620904:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 13168571221928:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 11019504478120:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out` 14240608782248:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 14240608782248:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 14240608782248:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 14240608782248:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 14315177994152:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: SSL_read 0 14315177994152:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 14315177994152:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 14315177994152:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out` 3685880276904:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 14734102992808:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 17414841145256:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 10470916589480:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: SSL_read 0 10470916589480:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 10470916589480:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10470916589480:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out` 3105071257512:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 3105071257512:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 3105071257512:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 3105071257512:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out` 3166042478504:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 3166042478504:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 3166042478504:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 3166042478504:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out` 1248381937576:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 1248381937576:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 1248381937576:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 1248381937576:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out` 2291533596584:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 2291533596584:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 2291533596584:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 2291533596584:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 13878122813352:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 8961816643496:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out` 13079583111080:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 13079583111080:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 13079583111080:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 13079583111080:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out` 644471801768:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 644471801768:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 644471801768:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 644471801768:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-verify.out` 9989936838568:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 9989936838568:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 9989936838568:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 9989936838568:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 14565025314728:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 2437804869544:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out` 15727998740392:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 15727998740392:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 15727998740392:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 15727998740392:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out` 17003641767848:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 17003641767848:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 17003641767848:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 17003641767848:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out` 12656668112808:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 12656668112808:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 12656668112808:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 12656668112808:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 12769075648424:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 9799724734376:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 13618982307752:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 8823863474088:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 10851534907304:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 8898329221032:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 15569076717480:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 2359299876776:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out` 13455124252584:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out` 6703065454504:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out` 1845084743592:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 12447075448744:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out` 8595174397864:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out` 13531486889896:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out` 6044819056552:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 4770345260968:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out` 11434208876456:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out` 7020788840360:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out` 10755640821672:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 5287456954280:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out` 16501929834408:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 12234523711400:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 10511355893672:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 8140109412264:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out` 149683693480:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out` 11421297616808:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out` 9963838027688:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 9963838027688:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 9963838027688:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 9963838027688:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 9963838027688:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 9963838027688:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 9963838027688:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out` 2657929828264:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 2657929828264:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 2657929828264:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 2657929828264:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 2657929828264:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 2657929828264:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 2657929828264:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out` 10426477590440:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 10426477590440:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 10426477590440:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10426477590440:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 10426477590440:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 10426477590440:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10426477590440:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 2549671692200:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 4884080301992:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out` 13654459164584:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 13654459164584:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 13654459164584:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 13654459164584:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 13654459164584:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 13654459164584:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 13654459164584:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out` 16262143571880:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16262143571880:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16262143571880:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16262143571880:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16262143571880:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16262143571880:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16262143571880:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out` 7236370102184:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 7236370102184:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7236370102184:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7236370102184:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 7236370102184:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7236370102184:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7236370102184:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 4791615735720:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 4281406543784:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out` 355678173096:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 355678173096:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 355678173096:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 355678173096:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 355678173096:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 355678173096:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 355678173096:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out` 16149727762344:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16149727762344:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16149727762344:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16149727762344:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16149727762344:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16149727762344:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16149727762344:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-certverify.out` 949181241256:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 949181241256:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 949181241256:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 949181241256:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 949181241256:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 949181241256:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 949181241256:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 14718512240552:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 12239760979880:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out success ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out` 8373889800104:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out` 15683321632680:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out` 13895717197736:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 178963978152:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-verify.out` 8446976477096:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-verify.out 1605226506152:error:14039418:SSL routines:ACCEPT_SR_CERT_VRFY:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 server: SSL_accept -1 client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out` 1295566555048:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out` 15128538556328:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 7938593142696:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out` 863655651240:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out` 7819592759208:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out` 6648281036712:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 8662566340520:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out` 12153890928552:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 12153890928552:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 12153890928552:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 12153890928552:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 12153890928552:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 12153890928552:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 12153890928552:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out` 15938845706152:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 15938845706152:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 15938845706152:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 15938845706152:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 15938845706152:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 15938845706152:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 15938845706152:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out` 14028027074472:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 14028027074472:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 14028027074472:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 14028027074472:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 14028027074472:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 14028027074472:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 14028027074472:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 7060994492328:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 14449587140520:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out` 12913635477416:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 12913635477416:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 12913635477416:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 12913635477416:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 12913635477416:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 12913635477416:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 12913635477416:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 10485189097384:error:1403941B:SSL routines:ACCEPT_SR_CERT_VRFY:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out` 3784699525032:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 3784699525032:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 3784699525032:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 3784699525032:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 3784699525032:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 3784699525032:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 3784699525032:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-verify.out` 1581981083560:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 1581981083560:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 1581981083560:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 1581981083560:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 1581981083560:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 1581981083560:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 1581981083560:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 14443839223720:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 11440457947048:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out` 7895094405032:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 7895094405032:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7895094405032:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7895094405032:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 7895094405032:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7895094405032:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7895094405032:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out` 16654035625896:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16654035625896:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16654035625896:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16654035625896:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16654035625896:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16654035625896:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16654035625896:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out` 8663296079784:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 8663296079784:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 8663296079784:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 8663296079784:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 8663296079784:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 8663296079784:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 8663296079784:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 13087885629352:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 10138526644136:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out` 4991587710888:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 6683734755240:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 2628844328872:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 111596058536:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out` 8704301303720:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out` 9866575050664:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out` 2889222694824:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out` 11760218298280:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out` 6584811648936:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 3431250474920:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out` 6043427096488:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out` 16417557981096:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out` 3356622256040:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 16229293655976:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out` 9451902060456:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out` 16836473718696:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out` 4922574878632:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 12398974891944:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out` 10191199836072:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 2333057402792:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 13561769678760:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 5408329242536:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out` 5108360566696:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out` 9951384082344:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out` 4245018085288:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 4245018085288:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 4245018085288:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 4245018085288:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out` 2206294939560:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 2206294939560:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 2206294939560:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 2206294939560:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out` 8538754635688:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 8538754635688:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 8538754635688:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 8538754635688:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 12483794196392:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 14827656771496:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out` 700590626728:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 700590626728:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 700590626728:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 700590626728:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out` 11811230726056:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 11811230726056:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 11811230726056:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11811230726056:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out` 16984710231976:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16984710231976:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16984710231976:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16984710231976:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 14426821457832:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 9264539006888:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out` 10289509984168:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 10289509984168:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 10289509984168:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10289509984168:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out` 7006079362984:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 7006079362984:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7006079362984:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7006079362984:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify.out` 14229345998760:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 14229345998760:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 14229345998760:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 14229345998760:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 11460227655592:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 2784309110696:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out` 16107317577640:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16107317577640:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16107317577640:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16107317577640:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 1585622751144:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 16174339979176:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 1120581310376:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: SSL_read 0 1120581310376:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 1120581310376:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 1120581310376:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out` 13494439602088:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 13494439602088:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: client: SSL_read 0 13494439602088:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 13494439602088:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out` 5083093301160:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 5083093301160:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 5083093301160:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 5083093301160:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 3031520434088:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 13229979068328:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 2704299370408:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: SSL_read 0 2704299370408:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 2704299370408:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 2704299370408:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 10123389568936:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: SSL_read 0 10123389568936:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 10123389568936:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10123389568936:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out` 2464724027304:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out` 2850286409640:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out` 2292176947112:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 15096293746600:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out` 15293196703656:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out` 677669975976:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out` 14408067667880:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 3201330407336:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out` 12334179727272:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out` 6439365883816:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out` 13216757725096:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 14717664786344:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out` 9495234369448:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 9495234369448:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 9495234369448:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 9495234369448:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 14719651674024:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 9034591397800:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out` 1167387862952:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 1167387862952:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 1167387862952:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 1167387862952:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 8768104581032:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 8768104581032:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 8768104581032:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 8768104581032:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out` 9519527126952:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 9519527126952:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 9519527126952:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 9519527126952:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 9136968382376:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 8130397448104:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 11744284231592:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: SSL_read 0 11744284231592:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 11744284231592:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11744284231592:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 8159283173288:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 8159283173288:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: client: 8159283173288:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: SSL_read 08159283173288:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out` 4881722169256:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 4881722169256:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 4881722169256:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 4881722169256:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out 5270406121384:error:1403F41B:SSL routines:ACCEPT_SR_FINISHED:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 server: SSL_accept -1 client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out` 11599198308264:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 11599198308264:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 11599198308264:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11599198308264:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out` 14391871317928:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 14391871317928:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 14391871317928:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 14391871317928:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 9009339365288:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 869947828136:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out` 15550156937128:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 15550156937128:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 15550156937128:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 15550156937128:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out` 10961263433640:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 10961263433640:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 10961263433640:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10961263433640:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out` 7273367435176:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 7273367435176:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7273367435176:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7273367435176:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 8791334979496:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 12360867399592:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out` 14560378001320:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 14560378001320:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 14560378001320:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 14560378001320:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out` 7264019109800:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 7264019109800:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7264019109800:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7264019109800:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out` 8134374197160:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 8134374197160:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 8134374197160:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 8134374197160:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 1635591100328:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 7177899206568:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: client: SSL_accept -1SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: client: SSL_accept -1SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out success ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: client: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: SSL_read 0 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: client: SSL_accept -1SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: client: SSL_read 000000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: client: SSL_read 0 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-verify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-certverify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-verify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: client: SSL_accept -1SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: client: SSL_read 0 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: client: SSL_read 0 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: client: SSL_read 0 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: client: SSL_read 0 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: client: SSL_accept -1 SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: server: SSL_read 0 SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: client: SSL_accept -1SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: server: SSL_connect -1 SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_connect -1 server: SSL_accept -1 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_connect -1 server: SSL_accept -1 ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out success ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_connect -1 server: SSL_accept -1 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-bob ==== Bob, be happy! Tests finished. SKIP lib/libssl/interop Test skipped itself